Description
OpenCart 3.0.36 contains a cross-site request forgery vulnerability in the /account/edit endpoint that allows unauthenticated attackers to modify victim account details by tricking users into visiting malicious pages. Attackers can craft CSRF payloads that change victim email addresses and account information, then use password reset functionality to gain unauthorized access to compromised accounts.
Published: 2026-05-10
Score: 6.9 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

OpenCart 3.0.36 contains a cross‑site request forgery (CSRF) vulnerability in the /account/edit endpoint that allows an unauthenticated user to modify a victim’s account details, including email addresses. Once the account information has been altered, the attacker can trigger the password reset function to gain unauthorized access to the compromised account. This flaw exposes the confidentiality and integrity of user accounts and can lead to full account takeover.

Affected Systems

The vulnerability affects OpenCart installations running version 3.0.36 (and the build identified by the CPE as 3.0.3.6). All sites using this version of OpenCart are potentially compromised, regardless of custom extensions, unless a later patch has been applied.

Risk and Exploitability

The CVSS score of 6.9 classifies the flaw as moderate severity. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog, indicating there is no publicly known exploitation at the time of analysis. However, the attack requires only a malicious link to be visited by an authenticated user, making the exploitation path straightforward with no privileged access or technical barrier. The primary attack vector is a CSRF request, and compromised accounts can then be used to steal sensitive data or perform further malicious actions on the platform.

Generated by OpenCVE AI on May 10, 2026 at 14:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest OpenCart release that includes the CSRF fix (any version newer than 3.0.36).
  • If an upgrade cannot be performed immediately, add a CSRF token or referer header check to the /account/edit endpoint to reject unauthenticated requests.
  • Enable multi‑factor authentication for all user accounts and audit account changes for suspicious activity.

Generated by OpenCVE AI on May 10, 2026 at 14:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 10 May 2026 13:00:00 +0000

Type Values Removed Values Added
Description OpenCart 3.0.36 contains a cross-site request forgery vulnerability in the /account/edit endpoint that allows unauthenticated attackers to modify victim account details by tricking users into visiting malicious pages. Attackers can craft CSRF payloads that change victim email addresses and account information, then use password reset functionality to gain unauthorized access to compromised accounts.
Title OpenCart 3.0.36 Account Takeover via Cross Site Request Forgery
First Time appeared Opencart
Opencart opencart
Weaknesses CWE-352
CPEs cpe:2.3:a:opencart:opencart:3.0.3.6:*:*:*:*:*:*:*
Vendors & Products Opencart
Opencart opencart
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L'}


Subscriptions

Opencart Opencart
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-10T12:44:02.503Z

Reserved: 2026-02-01T11:24:18.718Z

Link: CVE-2021-47946

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-10T13:16:31.027

Modified: 2026-05-10T13:16:31.027

Link: CVE-2021-47946

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-10T15:30:14Z

Weaknesses