Skip to main content

CVE-2025-50849: n/a

High
VulnerabilityCVE-2025-50849cvecve-2025-50849
Published: Thu Jul 31 2025 (07/31/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

CS Cart 4.18.3 is vulnerable to Insecure Direct Object Reference (IDOR). The user profile functionality allows enabling or disabling stickers through a parameter (company_id) sent in the request. However, this operation is not properly validated on the server side. An authenticated user can manipulate the request to target other users' accounts and toggle the sticker setting by modifying the company_id or other object identifiers.

AI-Powered Analysis

AILast updated: 07/31/2025, 15:33:09 UTC

Technical Analysis

CVE-2025-50849 is an Insecure Direct Object Reference (IDOR) vulnerability identified in CS Cart version 4.18.3. The vulnerability arises from improper server-side validation of user-supplied parameters in the user profile functionality, specifically related to toggling stickers via a 'company_id' parameter. Authenticated users can manipulate this parameter to access or modify other users' accounts by changing the company_id or other object identifiers in the request. This lack of proper authorization checks allows attackers to perform unauthorized actions on resources they should not have access to. The vulnerability does not require user interaction beyond authentication, but it exploits insufficient access control mechanisms. Although no CVSS score is assigned and no known exploits are reported in the wild, the flaw represents a significant risk due to its potential to compromise user account settings and possibly escalate privileges or disrupt normal operations within the affected e-commerce platform.

Potential Impact

For European organizations using CS Cart 4.18.3, this vulnerability could lead to unauthorized manipulation of user account settings, potentially affecting customer trust and data integrity. Attackers exploiting this flaw might alter user-specific configurations, leading to confusion, service disruption, or reputational damage. In e-commerce contexts, such unauthorized changes could impact business operations, customer experience, and compliance with data protection regulations like GDPR, especially if personal data is indirectly exposed or altered. The vulnerability could also be leveraged as a foothold for further attacks within the application environment, increasing the risk of broader compromise. Given the widespread use of e-commerce platforms across Europe, organizations relying on CS Cart should consider the implications for both operational security and regulatory compliance.

Mitigation Recommendations

To mitigate this vulnerability, organizations should implement strict server-side authorization checks to ensure that any request modifying user profile settings validates that the authenticated user is authorized to perform actions on the specified company_id or related objects. This includes verifying ownership or permissions before processing the toggle sticker operation. Applying the principle of least privilege and enforcing robust access control mechanisms within the application logic is critical. Additionally, updating to a patched version of CS Cart once available is essential. In the interim, monitoring and logging user profile modification requests for anomalous activity can help detect exploitation attempts. Employing web application firewalls (WAFs) with custom rules to detect and block suspicious parameter tampering may provide temporary protection. Regular security audits and code reviews focusing on access control implementations are recommended to prevent similar vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-06-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 688b891aad5a09ad00b91983

Added to database: 7/31/2025, 3:17:46 PM

Last enriched: 7/31/2025, 3:33:09 PM

Last updated: 8/1/2025, 7:14:29 AM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats