Cyber Posture

CVE-2025-1116

High

Published: 08 February 2025

Published
08 February 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0006 17.1th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

A vulnerability, which was classified as critical, has been found in Dreamvention Live AJAX Search Free up to 1.0.6 on OpenCart. Affected by this issue is the function searchresults/search of the file /?route=extension/live_search/module/live_search.searchresults. The manipulation of the argument keyword leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

Security Summary

CVE-2025-1116 is a critical SQL injection vulnerability in Dreamvention Live AJAX Search Free versions up to 1.0.6 running on OpenCart. The issue affects the searchresults/search function in the file accessible via the route /?route=extension/live_search/module/live_search.searchresults, where the keyword argument can be manipulated to inject malicious SQL payloads. Classified under CWE-74 and CWE-89, it carries a CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L) and was published on 2025-02-08.

The vulnerability can be exploited remotely by unauthenticated attackers with low complexity, requiring no privileges or user interaction. By sending crafted requests with a malicious keyword parameter, attackers can execute arbitrary SQL queries, potentially leading to limited impacts on confidentiality, integrity, and availability, such as data exfiltration, modification, or denial of service on the underlying database.

VulDB advisories detail the vulnerability and reference a public exploit disclosure in a GitHub Gist at https://gist.github.com/mcdruid/d6a41cfebd9e10e63a8c698d3a8ad771, confirming the issue's remote exploitability. No specific patches or mitigations are outlined in the provided references, though updating to a fixed version beyond 1.0.6, if available, or disabling the module is implied as standard remediation for such extensions.

Details

CWE(s)
CWE-74CWE-89

References