# Exploit Title: Opencart 3.x.x Authenticated Stored XSS# Date: 08/15/2019# Exploit Author: Nipun Somani# Author Web: http://thehackerstore.net# Vendor Homepage: https://www.opencart.com/# Software Link: https://github.com/opencart/opencart# Version: 3.x.x# Tested on: Debian 9, Windows 10 x64# CVE : CVE-2019-15081
Description:
The Opencart Version 3.x.x allows editing Source/HTML of the Categories /
Product / Information pages in the admin panel which isn't sanitized to
user input allowing for an attacker to execute arbitrary javascript code
leading to Stored Cross-Site-Scripting(XSS).
Proof-of-Concept(POC):1. Log-in to admin-panel.2. Navigate to Catlog and then select any of [Categories or Products or Information] options andand pick any entry or create one.3. Under description click on Source option and insert your XSS payload.
i.e:"><script>alert("XSS")</script>4. Now visit the modified page of your public website. And your injected XSS payload will execute.