Impact
SureCart versions before 4.2.1 contain an authenticated SQL injection flaw on the REST API endpoint '/surecart/v1/integrations/{id}'. By inserting a dot into payloads such as 'model_name', 'model_id', 'integration_id', or 'provider', the query builder bypasses the normal escaping mechanism, allowing an attacker to inject arbitrary SQL, including UNION statements that can retrieve database contents.
Affected Systems
The affected product is the Surecart e‑commerce plugin from brainstormforce, with all releases prior to version 4.2.1 vulnerable.
Risk and Exploitability
The CVSS score of 9.3 indicates severe impact. EPSS is not available and the vulnerability is not listed in CISA’s KEV catalog. Exploitation requires authenticated access to the REST API, so a user with sufficient privileges can leverage the flaw to exfiltrate sensitive data.
OpenCVE Enrichment