CVE-2020-29471
Description
OpenCart 3.0.3.6 is affected by cross-site scripting (XSS) in the Profile Image. An admin can upload a profile image as a malicious code using JavaScript. Whenever anyone will see the profile picture, the code will execute and XSS will trigger.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
OpenCart 3.0.3.6 admin profile image upload fails to sanitize filenames, allowing stored XSS via a crafted SVG file.
Vulnerability
Overview
OpenCart version 3.0.3.6 is affected by a stored cross-site scripting (XSS) vulnerability in the Profile Image upload functionality. The root cause is insufficient sanitization of image filenames during the upload process. An authenticated administrator can upload a file with a malicious name containing JavaScript payloads, such as ">.png. The file is stored and rendered without proper escaping, causing the script to execute when any user views the profile page containing the image [1][2].
Exploitation
Exploitation requires an authenticated session with administrative privileges, limiting the attack surface to admin users. The attacker navigates to the profile page, edits the profile image, and uploads a specially crafted file (e.g., payload.png) that contains HTML and JavaScript in its filename. The stored XSS triggers automatically when the profile page is loaded by any user who sees the image. This attack does not require any user interaction beyond viewing the page [2].
Impact
Successful exploitation allows the attacker to execute arbitrary JavaScript in the context of the victim's browser session. This can lead to session hijacking, defacement, or theft of sensitive data displayed in the admin panel. Since the payload is stored, it affects all users who access the compromised profile page, potentially including other administrators or users with appropriate permissions [1][2].
Mitigation
The vendor has not released a public patch specifically for this vulnerability as of the publication date. Users are advised to restrict profile image uploads to trusted administrators only and consider applying input validation or output encoding manually. The vulnerability is documented in public exploit databases, increasing the risk of active exploitation [2].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- OpenCart/OpenCartdescription
- ghsa-coords
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-7vrp-3pff-c3j4ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2020-29471ghsaADVISORY
- www.exploit-db.com/exploits/49098ghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.