First published: Wed Aug 21 2024(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Zen Cart. Authentication is not required to exploit this vulnerability. The specific flaw exists within the findPluginAdminPage function. The issue results from the lack of proper validation of user-supplied data prior to passing it to a PHP include function. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the service account.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Zen Cart | ||
Zen Cart | =1.5.8a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-5762 is considered a critical vulnerability due to its ability to allow remote code execution without authentication.
To mitigate CVE-2024-5762, it is recommended to upgrade Zen Cart to the latest version that addresses this vulnerability.
CVE-2024-5762 affects Zen Cart version 1.5.8a and possibly earlier versions.
Yes, CVE-2024-5762 can be exploited remotely by attackers without requiring authentication.
The flaw in CVE-2024-5762 exists within the findPluginAdminPage function, which lacks proper validation.