Zen Cart 1.5.7b allows admins to execute arbitrary OS commands by inspecting an HTML radio input element (within the modules edit page) and inserting a command.
Max CVSS
9.0
EPSS Score
2.19%
Published
2021-01-26
Updated
2021-03-09
The traverseStrictSanitize function in admin_dir/includes/classes/AdminRequestSanitizer.php in ZenCart 1.5.5e mishandles key strings, which allows remote authenticated users to execute arbitrary PHP code by placing that code into an invalid array index of the admin_name array parameter to admin_dir/login.php, if there is an export of an error-log entry for that invalid array index.
Max CVSS
8.8
EPSS Score
0.26%
Published
2017-07-27
Updated
2017-08-04
Directory traversal vulnerability in Zen Cart 1.5.4 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the act parameter to ajax.php.
Max CVSS
10.0
EPSS Score
1.94%
Published
2017-08-24
Updated
2019-05-03
Zen Cart before 1.2.7 does not protect the admin/includes directory, which allows remote attackers to cause unknown impact via unspecified vectors, probably direct requests.
Max CVSS
10.0
EPSS Score
0.89%
Published
2006-02-15
Updated
2013-01-03
4 vulnerabilities found