First published: Tue Jan 26 2021(Updated: )
Zen Cart 1.5.7b allows admins to execute arbitrary OS commands by inspecting an HTML radio input element (within the modules edit page) and inserting a command.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zen Cart | =1.5.7b |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3291 has been assigned a high severity rating due to its ability to allow arbitrary OS command execution.
CVE-2021-3291 allows unauthorized users to execute arbitrary OS commands through the admin interface of Zen Cart 1.5.7b.
To mitigate CVE-2021-3291, it is recommended to upgrade to a patched version of Zen Cart or implement stricter access controls.
Exploitation of CVE-2021-3291 could lead to complete system compromise, unauthorized access, and potential data loss.
Yes, there are known proof-of-concept exploits for CVE-2021-3291 that demonstrate how to execute arbitrary commands.