CVE-2025-1116

7.3 HIGH

📋 TL;DR

This critical SQL injection vulnerability in Dreamvention Live AJAX Search Free for OpenCart allows remote attackers to execute arbitrary SQL commands via the 'keyword' parameter. Attackers can potentially read, modify, or delete database content, including sensitive user data. All OpenCart installations using affected versions of this extension are vulnerable.

💻 Affected Systems

Products:
  • Dreamvention Live AJAX Search Free for OpenCart
Versions: up to 1.0.6
Operating Systems: Any running OpenCart
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the Live AJAX Search extension to be installed and enabled

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, data destruction, or full system takeover via SQL injection to RCE chaining

🟠

Likely Case

Database information disclosure including user credentials, order data, and administrative access

🟢

If Mitigated

Limited impact with proper input validation and database permissions, potentially only error messages or partial data exposure

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details are publicly available in GitHub gist, making this easily exploitable

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.7 or later

Vendor Advisory: Not available

Restart Required: No

Instructions:

1. Update to Live AJAX Search Free version 1.0.7 or later from the OpenCart extension marketplace. 2. If update not available, remove the extension entirely.

🔧 Temporary Workarounds

Disable vulnerable extension

all

Temporarily disable the Live AJAX Search extension until patched

Navigate to OpenCart admin > Extensions > Extensions > Modules > Live AJAX Search > Disable

WAF rule for SQL injection

all

Implement web application firewall rules to block SQL injection attempts on search parameters

🧯 If You Can't Patch

  • Remove the Live AJAX Search extension entirely from your OpenCart installation
  • Implement strict input validation and parameterized queries at the application level

🔍 How to Verify

Check if Vulnerable:

Check extension version in OpenCart admin panel: Extensions > Extensions > Modules > Live AJAX Search

Check Version:

Check OpenCart admin panel or examine extension files for version information

Verify Fix Applied:

Verify extension version is 1.0.7 or higher and test search functionality with SQL injection test payloads

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed search attempts with SQL syntax
  • Requests to /?route=extension/live_search/module/live_search.searchresults with suspicious parameters

Network Indicators:

  • HTTP POST/GET requests containing SQL keywords (UNION, SELECT, INSERT) in search parameters
  • Abnormal traffic patterns to search endpoints

SIEM Query:

source="web_logs" AND (url="*live_search.searchresults*" AND (param="*UNION*" OR param="*SELECT*" OR param="*INSERT*"))

🔗 References

📤 Share & Export