VYPR
Medium severityNVD Advisory· Published Oct 30, 2025· Updated Apr 15, 2026

CVE-2025-10317

CVE-2025-10317

Description

Quick.Cart is vulnerable to Cross-Site Request Forgery in product creation functionality. Malicious attacker can craft special website, which when visited by the admin, will automatically send a POST request creating a malicious product with content defined by the attacker. This software does not implement any protection against this type of attack. All forms available in this software are potentially vulnerable.

The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 6.7 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Quick.Cart 6.7 is vulnerable to CSRF in product creation, allowing an attacker to trick an admin into creating a malicious product.

Vulnerability

Overview

CVE-2025-10317 is a Cross-Site Request Forgery (CSRF) vulnerability in OpenSolution Quick.Cart, specifically within the product creation functionality. The software does not implement any anti-CSRF tokens or other protection mechanisms, making all forms in the application potentially vulnerable [1]. The vendor was notified but did not provide details on the vulnerable version range; only version 6.7 was tested and confirmed as vulnerable [1].

Exploitation

An attacker can craft a malicious website that, when visited by an authenticated administrator, automatically sends a forged POST request to the Quick.Cart application. This request creates a new product with content defined by the attacker [1]. The attack requires no special requires no special privileges beyond the admin being logged in and visiting the attacker-controlled page.

Impact

Successful exploitation allows the attacker to create arbitrary products in the Quick.Cart store. This could be used to inject malicious content, manipulate inventory, or potentially serve as a stepping stone for further attacks, such as stored XSS if the product data is rendered unsafely [1].

Mitigation

As of the publication date (2025-10-30), no patch or official response from the vendor has been released. Users of Quick.Cart 6.7 and possibly other versions are advised to implement CSRF protection manually, such as adding anti-CSRF tokens to all forms, or to restrict admin access to trusted networks [1]. The vulnerability has been publicly disclosed by CERT Polska [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.