Description
KomSeo Cart 1.3 contains an SQL injection vulnerability that allows attackers to inject SQL commands through the 'my_item_search' parameter in edit.php. Attackers can submit POST requests with malicious SQL payloads to extract sensitive database information using boolean-based blind or error-based injection techniques.
Published: 2026-03-26
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Data Disclosure
Action: Patch
AI Analysis

Impact

KomSeo Cart 1.3 contains a classic SQL injection vulnerability that allows attackers to inject arbitrary SQL through the my_item_search parameter in edit.php. By submitting crafted POST requests, an adversary can employ boolean‑based blind or error‑based techniques to extract sensitive data from the database. This results in a breach of confidentiality, as the attacker may read private information stored in the database. The weakness corresponds to CWE‑89, which represents unvalidated input that leads to SQL injection.

Affected Systems

The issue affects the Sitemakin KomSeo Cart application version 1.3. The CNA data does not list any other affected versions, so the scope is limited to this release. No other products or vendors are identified.

Risk and Exploitability

The base CVSS score of 8.8 indicates high severity. The EPSS score of less than 1  that, at the time of assessment, the probability of exploitation is low, although the vulnerability is publicly known. The vulnerability is not included in the CISA Known Exploited Vulnerabilities catalog, meaning there is no confirmed active exploitation in the wild. The attack vector is most likely remote over the network: an attacker who can reach the exposed web application and submit POST data to edit.php can trigger the injection. No special privileges or pre‑existing access are mentioned in the CVE description, so a standard web‑app attacker with access to the public interface can attempt exploitation. Successful exploitation would allow the attacker to read sensitive data from the database, potentially including customer information, order details, or other confidential data.

Generated by OpenCVE AI on March 26, 2026 at 14:08 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official patch or upgrade to a non‑vulnerable version of KomSeo Cart released by Sitemakin.
  • If a patch is unavailable, block or restrict access to edit.php or the my_item_search parameter using a web‑application firewall or server configuration.
  • Ensure the database account used by KomSeo Cart has the least privilege necessary—limit it to the permissions required for normal operation.
  • Implement input validation and use parameterized queries or prepared statements for the my_item_search field to mitigate injection until an official fix is applied.

Generated by OpenCVE AI on March 26, 2026 at 14:08 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Sitemakin
Sitemakin komseo Cart
Vendors & Products Sitemakin
Sitemakin komseo Cart

Thu, 26 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
Description KomSeo Cart 1.3 contains an SQL injection vulnerability that allows attackers to inject SQL commands through the 'my_item_search' parameter in edit.php. Attackers can submit POST requests with malicious SQL payloads to extract sensitive database information using boolean-based blind or error-based injection techniques.
Title KomSeo Cart 1.3 SQL Injection via edit.php
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}

cvssV4_0

{'score': 8.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Sitemakin Komseo Cart
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-26T11:39:53.286Z

Reserved: 2026-03-26T11:33:29.009Z

Link: CVE-2018-25206

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-26T12:16:05.650

Modified: 2026-03-26T15:13:15.790

Link: CVE-2018-25206

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:28:42Z

Weaknesses