Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67684: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in OpenSolution Quick.Cart

0
Critical
VulnerabilityCVE-2025-67684cvecve-2025-67684cwe-22
Published: Thu Jan 22 2026 (01/22/2026, 11:57:28 UTC)
Source: CVE Database V5
Vendor/Project: OpenSolution
Product: Quick.Cart

Description

Quick.Cart is vulnerable to Local File Inclusion and Path Traversal issues in the theme selection mechanism. Quick.Cart allows a privileged user to upload arbitrary file contents while only validating the filename extension. This allows an attacker to include and execute uploaded PHP code, resulting in Remote Code Execution on the server. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 6.7 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.

AI-Powered Analysis

AILast updated: 01/22/2026, 12:20:34 UTC

Technical Analysis

CVE-2025-67684 is a critical security vulnerability affecting OpenSolution's Quick.Cart e-commerce platform, specifically version 6.7. The flaw is categorized under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory), commonly known as a path traversal vulnerability. The issue occurs in the theme selection mechanism where privileged users can upload files. The system only validates the filename extension but fails to properly sanitize or restrict the file path, enabling attackers to upload arbitrary PHP files containing malicious code. Once uploaded, these files can be included and executed by the server, resulting in remote code execution (RCE). This vulnerability does not require user interaction or additional authentication beyond privileged user access, making exploitation straightforward if such access is obtained. The vendor was notified early but has not disclosed detailed information or provided patches, and only version 6.7 has been confirmed vulnerable. The CVSS 4.0 base score of 9.4 reflects the vulnerability's critical nature, with network attack vector, low attack complexity, no privileges required beyond privileged user access, and no user interaction needed. The impact spans confidentiality, integrity, and availability, as attackers can execute arbitrary code, potentially leading to full system compromise. No known exploits have been observed in the wild yet, but the vulnerability's characteristics make it a high-risk target for attackers.

Potential Impact

For European organizations, especially those operating e-commerce platforms using Quick.Cart 6.7, this vulnerability poses a severe risk. Successful exploitation can lead to full system compromise, data breaches involving customer and transaction data, disruption of business operations, and potential financial losses. The ability to execute arbitrary code remotely can allow attackers to install backdoors, pivot within networks, or exfiltrate sensitive information. Given the critical CVSS score and the lack of vendor patches, organizations face increased exposure. The threat is particularly acute for companies with privileged users who have upload capabilities, as insider threats or compromised credentials could facilitate exploitation. The reputational damage and regulatory consequences under GDPR for data breaches further amplify the impact. Additionally, the vulnerability could be leveraged in supply chain attacks if Quick.Cart is integrated into larger platforms or services.

Mitigation Recommendations

1. Immediately audit and restrict privileged user access to only those who require upload capabilities, enforcing the principle of least privilege. 2. Implement strict input validation and sanitization on file uploads, including verifying file contents beyond extensions, to prevent uploading executable code. 3. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious file upload patterns and path traversal attempts. 4. Monitor file system changes and web server logs for unusual activity indicative of exploitation attempts. 5. Isolate the Quick.Cart application environment using containerization or sandboxing to limit the blast radius of potential compromises. 6. Until an official patch is released, consider disabling the theme upload feature or replacing it with a safer alternative. 7. Regularly update and patch all related software components and dependencies to reduce attack surface. 8. Conduct security awareness training for privileged users to recognize phishing and credential compromise risks. 9. Prepare incident response plans specific to web application compromises involving RCE. 10. Engage with OpenSolution for updates and verify if newer versions address this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
CERT-PL
Date Reserved
2025-12-10T10:33:05.198Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 697212a84623b1157c6d1f12

Added to database: 1/22/2026, 12:06:00 PM

Last enriched: 1/22/2026, 12:20:34 PM

Last updated: 2/7/2026, 8:22:06 AM

Views: 24

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats