First published: Tue Mar 17 2020(Updated: )
OpenCart 3.0.3.2 allows remote authenticated users to conduct XSS attacks via a crafted filename in the users' image upload section.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/opencart/opencart | <=3.0.3.2 | |
OpenCart | =3.0.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-10596 is medium with a CVSS score of 5.4.
CVE-2020-10596 allows remote authenticated users to conduct XSS attacks via a crafted filename in the users' image upload section in OpenCart 3.0.3.2.
An attacker can exploit CVE-2020-10596 by uploading an image with a crafted filename that contains malicious code, which will be executed when the image is viewed by another user.
Yes, a fix for CVE-2020-10596 is available. It is recommended to update to a patched version of OpenCart.
You can find more information about CVE-2020-10596 on the NIST NVD website, OpenCart GitHub issue tracker, and Packet Storm Security.