Impact
Quick.Cart allows a user’s session identifier to be set before authentication and preserves that value after login, enabling attackers to predefine a session ID for a victim and later hijack the authenticated session. This flaw, classified as CWE‑384, leads to unauthorized access by masquerading as the victim, potentially exposing confidential data and permitting further malicious actions.
Affected Systems
The affected product is OpenSolution Quick.Cart. Version 6.7 was confirmed vulnerable, and other versions have not been tested but may also share the same issue. No other versions or product variants were mentioned in the vendor notice.
Risk and Exploitability
The vulnerability receives a CVSS score of 4.8, indicating moderate severity. The EPSS value is less than 1 %, suggesting currently low exploitation probability. It is not listed in the CISA KEV catalog. Attackers could exploit the flaw by crafting requests that set a session cookie before authentication, a path typical to web applications that allow cookie manipulation. Because no patch is publicly available, the risk remains unless mitigated by configuration changes.
OpenCVE Enrichment