Home

Description

Quick.Cart is vulnerable to Cross-Site Request Forgery in product creation functionality. Malicious attacker can craft special website, which when visited by the admin, will automatically send a POST request creating a malicious product with content defined by the attacker. This software does not implement any protection against this type of attack. All forms available in this software are potentially vulnerable. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 6.7 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.

PUBLISHED Reserved 2025-09-12 | Published 2025-10-30 | Updated 2025-10-30 | Assigner CERT-PL




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N

Problem types

CWE-352 Cross-Site Request Forgery (CSRF)

Product status

Default status
unknown

6.7 (semver)
affected

Credits

Łukasz vq4s Woźniak finder

References

cert.pl/posts/2025/10/CVE-2025-10317 third-party-advisory

opensolution.org/sklep-internetowy-quick-cart.html product

cve.org (CVE-2025-10317)

nvd.nist.gov (CVE-2025-10317)

Download JSON