CVE-2025-9797
BaseFortify
Publication date: 2025-09-01
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| mrvautin | expresscart | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-74 | The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component. |
| CWE-707 | The product does not ensure or incorrectly ensures that structured messages or data are well-formed and that certain security properties are met before being read from an upstream component or sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the mrvautin expressCart software, specifically in the Edit Product Page component at the /admin/product/edit/ file. It allows an attacker to perform injection attacks remotely by manipulating an unknown function in that component. The vulnerability has been publicly disclosed and can be exploited.
How can this vulnerability impact me? :
The vulnerability allows remote attackers to inject malicious input into the application, which can lead to unauthorized manipulation of the product editing functionality. Although it does not impact confidentiality or availability, it can affect the integrity of the system by allowing unauthorized changes.