VYPR
Moderate severityNVD Advisory· Published Dec 29, 2020· Updated Aug 4, 2024

CVE-2020-29471

CVE-2020-29471

Description

OpenCart 3.0.3.6 is affected by cross-site scripting (XSS) in the Profile Image. An admin can upload a profile image as a malicious code using JavaScript. Whenever anyone will see the profile picture, the code will execute and XSS will trigger.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

OpenCart 3.0.3.6 admin profile image upload fails to sanitize filenames, allowing stored XSS via a crafted SVG file.

Vulnerability

Overview

OpenCart version 3.0.3.6 is affected by a stored cross-site scripting (XSS) vulnerability in the Profile Image upload functionality. The root cause is insufficient sanitization of image filenames during the upload process. An authenticated administrator can upload a file with a malicious name containing JavaScript payloads, such as ">.png. The file is stored and rendered without proper escaping, causing the script to execute when any user views the profile page containing the image [1][2].

Exploitation

Exploitation requires an authenticated session with administrative privileges, limiting the attack surface to admin users. The attacker navigates to the profile page, edits the profile image, and uploads a specially crafted file (e.g., payload.png) that contains HTML and JavaScript in its filename. The stored XSS triggers automatically when the profile page is loaded by any user who sees the image. This attack does not require any user interaction beyond viewing the page [2].

Impact

Successful exploitation allows the attacker to execute arbitrary JavaScript in the context of the victim's browser session. This can lead to session hijacking, defacement, or theft of sensitive data displayed in the admin panel. Since the payload is stored, it affects all users who access the compromised profile page, potentially including other administrators or users with appropriate permissions [1][2].

Mitigation

The vendor has not released a public patch specifically for this vulnerability as of the publication date. Users are advised to restrict profile image uploads to trusted administrators only and consider applying input validation or output encoding manually. The vulnerability is documented in public exploit databases, increasing the risk of active exploitation [2].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.