CVE-2021-37823: OpenCart SQL injection vulnerability
4.9
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.16287%
CWE
Published
11/3/2022
Updated
9/7/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
opencart/opencart | composer | <= 3.0.3.7 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability manifests in the backup/restore
functionality where user-supplied SQL file content is directly executed. The Medium article demonstrates SQL injection via modified backup files containing updatexml
payloads. This indicates the restore handler executes raw SQL without proper sanitization. The controller structure follows OpenCart
's convention where admin maintenance features are typically located in admin/controller/tool/backup.php
. The high confidence comes from direct correlation between described attack vector (file restore
), SQL execution behavior, and CWE-89
classification.