CVE-2024-58341

OpenCart Core 4.0.2.3 contains a SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'search' parameter. Attackers can send GET requests to the product search endpoint with malicious 'search' values to extract sensitive database information using boolean-based blind or time-based blind SQL injection techniques.
Configurations

Configuration 1 (hide)

cpe:2.3:a:opencart:opencart:4.0.2.3:*:*:*:*:*:*:*

History

27 Mar 2026, 19:24

Type Values Removed Values Added
First Time Opencart
Opencart opencart
CPE cpe:2.3:a:opencart:opencart:4.0.2.3:*:*:*:*:*:*:*
Summary
  • (es) OpenCart Core 4.0.2.3 contiene una vulnerabilidad de inyección SQL que permite a atacantes no autenticados manipular consultas de base de datos inyectando código SQL a través del parámetro 'search'. Los atacantes pueden enviar solicitudes GET al endpoint de búsqueda de productos con valores 'search' maliciosos para extraer información sensible de la base de datos utilizando técnicas de inyección SQL ciega basada en booleanos o ciega basada en tiempo.
References () https://github.com/opencart/opencart/releases - () https://github.com/opencart/opencart/releases - Release Notes
References () https://www.exploit-db.com/exploits/51940 - () https://www.exploit-db.com/exploits/51940 - Exploit, VDB Entry
References () https://www.opencart.com/ - () https://www.opencart.com/ - Product
References () https://www.vulncheck.com/advisories/opencart-core-sql-injection-via-search-parameter - () https://www.vulncheck.com/advisories/opencart-core-sql-injection-via-search-parameter - Third Party Advisory

25 Mar 2026, 16:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-25 16:16

Updated : 2026-03-27 19:24


NVD link : CVE-2024-58341

Mitre link : CVE-2024-58341

CVE.ORG link : CVE-2024-58341


JSON object : View

Products Affected

opencart

  • opencart
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')