VYPR
High severity8.2NVD Advisory· Published May 10, 2026· Updated May 12, 2026

CVE-2021-47928

CVE-2021-47928

Description

Opencart TMD Vendor System 3.x contains a blind SQL injection vulnerability that allows unauthenticated attackers to extract database information by injecting SQL code through the product_id parameter. Attackers can craft malicious SQL queries using time-based or content-based blind injection techniques to enumerate usernames, emails, and password reset codes from the oc_user table.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Unauthenticated blind SQL injection in OpenCart TMD Vendor System 3.x allows attackers to extract database contents via the product_id parameter.

Vulnerability

Overview

CVE-2021-47928 describes a blind SQL injection vulnerability in the OpenCart TMD Vendor System extension version 3.x. The flaw resides in the product_id parameter, which is not properly sanitized before being used in SQL queries. This allows an unauthenticated attacker to inject arbitrary SQL code, leveraging time-based or content-based blind injection techniques to extract sensitive data from the database [1][2][4].

Exploitation

The attack is performed over HTTP by sending crafted requests to the product route with a malicious product_id value. No authentication is required, and the attacker does not need any special network position beyond being able to reach the vulnerable OpenCart instance. The blind nature of the injection means the attacker must observe response timing or content differences to infer the results of the injected queries [2][4].

Impact

Successful exploitation enables an attacker to enumerate usernames, email addresses, and password reset codes from the oc_user table. This information can be used to compromise user accounts, potentially leading to privilege escalation or further attacks against the application and its users [1][2][4].

Mitigation

As of the publication date, the vendor has not released a patch for this vulnerability. Users of the TMD Vendor System 3.x are advised to apply input validation and parameterized queries as a workaround, or consider disabling the vulnerable functionality until a fix is available. The vulnerability has been publicly disclosed and an exploit is available, increasing the risk of active exploitation [2][4].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.