First published: Sat Jun 22 2024(Updated: )
This affects versions of the package opencart/opencart from 0.0.0. An SQL Injection issue was identified in the Divido payment extension for OpenCart, which is included by default in version 3.0.3.9. As an anonymous unauthenticated user, if the Divido payment module is installed (it does not have to be enabled), it is possible to exploit SQL injection to gain unauthorised access to the backend database. For any site which is vulnerable, any unauthenticated user could exploit this to dump the entire OpenCart database, including customer PII data.
Credit: report@snyk.io report@snyk.io
Affected Software | Affected Version | How to fix |
---|---|---|
composer/opencart/opencart | <=3.0.3.9 | |
OpenCart | =3.0.3.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-21514 is classified as a high severity SQL Injection vulnerability.
To fix CVE-2024-21514, update the OpenCart package to a version later than 3.0.3.9.
CVE-2024-21514 affects OpenCart version 3.0.3.9 and earlier.
CVE-2024-21514 is an SQL Injection vulnerability found in the Divido payment extension.
CVE-2024-21514 can be exploited by anonymous unauthenticated users if the Divido payment module is installed.