Impact
SeoToaster Ecommerce 3.0.0 contains a local file inclusion vulnerability that allows an authenticated attacker to retrieve the contents of any file on the server by sending a crafted POST request to the backend theme endpoints using directory traversal sequences in the getcss or getjs parameters.
Affected Systems
The vulnerability affects Seotoaster’s SeoToaster Ecommerce product, version 3.0.0. The compromised components are the backend theme editing endpoints located at /backend/backend_theme/editcss/ and /backend/backend_theme/editjs/.
Risk and Exploitability
The CVSS base score of 6.8 indicates medium severity. Exploitation requires authenticated access to the backend system, limiting the attack surface. EPSS data is not available and the vulnerability is not listed in the CISA KEV catalog. The attack vector is web‑based, involving POST requests to the vulnerable endpoints with traversal payloads.
OpenCVE Enrichment