VYPR
Moderate severityNVD Advisory· Published Dec 29, 2020· Updated Aug 4, 2024

CVE-2020-29470

CVE-2020-29470

Description

OpenCart 3.0.3.6 is affected by cross-site scripting (XSS) in the Subject field of mail. This vulnerability can allow an attacker to inject the XSS payload in the Subject field of the mail and each time any user will open that mail of the website, the XSS triggers and the attacker can able to steal the cookie according to the crafted payload.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

OpenCart 3.0.3.6 is vulnerable to stored XSS via the Subject field of mail, allowing attackers to steal cookies when users open the email.

Vulnerability

Description

OpenCart 3.0.3.6 is affected by a stored cross-site scripting (XSS) vulnerability in the Subject field of the mail functionality [1]. The application fails to properly sanitize user input in the Subject field, allowing an attacker to inject malicious scripts that are stored and executed when the email is viewed.

Exploitation

An attacker with administrative access to the OpenCart admin panel can exploit this vulnerability by navigating to Marketing → Mail and inserting a crafted payload into the Subject field [2]. When the mail is sent and subsequently opened by any user (e.g., a customer or another admin), the injected script executes in the context of the victim's browser. The provided proof-of-concept payload uses `` to demonstrate script execution [2].

Impact

Successful exploitation allows an attacker to execute arbitrary JavaScript in the context of the victim's session, potentially leading to cookie theft, session hijacking, or defacement. Since the attack is stored, the payload persists and affects every user who views the malicious email.

Mitigation

As of the publication date, OpenCart 3.0.3.6 is the affected version. Users should upgrade to a patched release if available. A workaround involves restricting access to the mail functionality to trusted administrators only and implementing manual input validation for the Subject field.

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.