CVE-2024-58341
Published: 25 March 2026
Description
OpenCart Core 4.0.2.3 contains a SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'search' parameter. Attackers can send GET requests to the product search endpoint with malicious 'search' values to extract…
more
sensitive database information using boolean-based blind or time-based blind SQL injection techniques.
Mitigating Controls (NIST 800-53 r5)AI
Directly requires validating and sanitizing user inputs like the 'search' parameter to prevent SQL injection exploitation.
Mandates identification, reporting, and correction of flaws such as this SQL injection vulnerability through patching.
Requires vulnerability scanning to detect SQL injection issues like CVE-2024-58341 and initiate remediation.
Security SummaryAI
OpenCart Core version 4.0.2.3 is affected by CVE-2024-58341, a SQL injection vulnerability (CWE-89) in the product search endpoint. The flaw arises from insufficient sanitization of the 'search' parameter in GET requests, enabling attackers to inject malicious SQL code into database queries. This allows extraction of sensitive database information through boolean-based blind or time-based blind SQL injection techniques. The vulnerability has a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N), indicating high severity due to its network accessibility and lack of prerequisites.
Unauthenticated attackers can exploit this vulnerability remotely by crafting GET requests to the product search endpoint with specially manipulated 'search' values. Successful exploitation enables data exfiltration, such as dumping user credentials, orders, or other confidential information from the database, without requiring privileges, user interaction, or impacting availability. The low attack complexity makes it accessible to attackers with basic SQL injection knowledge.
Mitigation details are available in vendor advisories and related resources, including the OpenCart GitHub releases page for patches, the official OpenCart website, a Vulncheck advisory on the search parameter SQL injection, and an Exploit-DB entry with a proof-of-concept (exploit ID 51940). Security practitioners should apply the latest updates from these sources to remediate the issue.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CVE-2024-58341 is a SQL injection in a public-facing OpenCart web application (T1190), enabling unauthenticated remote attackers to extract sensitive database information such as credentials (T1213.006).