Description
A vulnerability was determined in OpenCart 4.1.0.3. This affects an unknown part of the file installer.php of the component Extension Installer Page. Executing a manipulation can lead to path traversal. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-04-02
Score: 5.1 Medium
EPSS: n/a
KEV: No
Impact: Unauthorized file access via path traversal
Action: Apply Patch
AI Analysis

Impact

A path traversal vulnerability exists in the installer.php script of the Extension Installer page in OpenCart 4.1.0.3. The flaw allows an attacker to supply a crafted request that causes the application to resolve a file path outside the intended directory. This results in the ability to read files on the server that are not meant to be exposed, potentially exposing configuration files, credentials, or other sensitive data. The likely impact is disclosure of confidential information beyond the scope of the user’s privileges.

Affected Systems

The affected product is OpenCart, specifically the 4.1.0.3 release of the Extension Installer component. No other versions or products are explicitly listed as affected.

Risk and Exploitability

The CVSS score of 5.1 indicates a moderate severity. The EPSS score is not available, and the vulnerability is not listed in CISA’s KEV catalog, suggesting it is not a widely exploited or high‑profile issue. The attack can be launched remotely by sending a crafted request to installer.php. There is no official patch or upgrade path provided by the vendor in the supplied data, so exploitation remains feasible until a fix is released. The potential damage is primarily the unauthorized disclosure of files, which could lead to further compromise if sensitive credentials are exposed.

Generated by OpenCVE AI on April 2, 2026 at 15:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to a patched version of OpenCart or remove the Extension Installer component if it required
  • Restrict access to installer.php by requiring authentication or limiting requests to known IP addresses
  • Deploy a web application firewall rule that blocks path traversal patterns such as ".." or encoded equivalents on installer.php
  • Validate and sanitize all file path parameters on the server to ensure directory traversal characters are not permitted
  • Monitor server logs for suspicious requests to installer.php containing traversal patterns and investigate any unauthorized access attempts

Generated by OpenCVE AI on April 2, 2026 at 15:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 02 Apr 2026 13:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in OpenCart 4.1.0.3. This affects an unknown part of the file installer.php of the component Extension Installer Page. Executing a manipulation can lead to path traversal. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Title OpenCart Extension Installer installer.php path traversal
First Time appeared Opencart
Opencart opencart
Weaknesses CWE-22
CPEs cpe:2.3:a:opencart:opencart:*:*:*:*:*:*:*:*
Vendors & Products Opencart
Opencart opencart
References
Metrics cvssV2_0

{'score': 5.8, 'vector': 'AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.7, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Opencart Opencart
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-02T13:14:33.219Z

Reserved: 2026-04-01T13:50:33.935Z

Link: CVE-2026-5331

cve-icon Vulnrichment

Updated: 2026-04-02T13:14:21.453Z

cve-icon NVD

Status : Received

Published: 2026-04-02T13:16:27.870

Modified: 2026-04-02T13:16:27.870

Link: CVE-2026-5331

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T20:21:18Z

Weaknesses