CVE-2025-1117

7.3 HIGH

📋 TL;DR

This critical SQL injection vulnerability in CoinRemitter OpenCart plugin allows remote attackers to execute arbitrary SQL commands by manipulating the 'coin' parameter. It affects OpenCart installations using CoinRemitter plugin versions 0.0.1 and 0.0.2. Successful exploitation could lead to database compromise and unauthorized access to sensitive information.

💻 Affected Systems

Products:
  • CoinRemitter OpenCart Plugin
Versions: 0.0.1 through 0.0.2
Operating Systems: Any OS running OpenCart
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all OpenCart installations using vulnerable CoinRemitter plugin versions regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise allowing data theft, modification, or deletion; potential for full system takeover via SQL injection leading to remote code execution.

🟠

Likely Case

Unauthorized access to sensitive data including user information, payment details, and administrative credentials stored in the database.

🟢

If Mitigated

Limited impact with proper input validation and parameterized queries preventing SQL injection.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable and affects internet-facing OpenCart installations.
🏢 Internal Only: MEDIUM - Internal systems could be exploited by authenticated users or through other attack vectors.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details are publicly available in the GitHub gist reference, making this easily exploitable by attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.0.3

Vendor Advisory: https://github.com/CoinRemitter/opencart/releases/tag/0.0.3

Restart Required: No

Instructions:

1. Download CoinRemitter plugin version 0.0.3 from GitHub releases. 2. Replace the existing plugin files with the patched version. 3. Clear OpenCart cache if applicable.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side validation to sanitize the 'coin' parameter before processing

Implement parameterized queries or prepared statements for all database operations involving user input

Web Application Firewall

all

Deploy WAF rules to block SQL injection patterns in the 'coin' parameter

Configure WAF to block SQL keywords and special characters in the coin parameter

🧯 If You Can't Patch

  • Disable or remove the CoinRemitter plugin entirely from OpenCart installation
  • Implement network segmentation to isolate the vulnerable system and restrict database access

🔍 How to Verify

Check if Vulnerable:

Check OpenCart admin panel → Extensions → Extensions → Payments → CoinRemitter version

Check Version:

Check the plugin version in OpenCart admin panel or examine the plugin files for version information

Verify Fix Applied:

Verify plugin version shows 0.0.3 or higher in OpenCart extensions list

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts following SQL injection patterns
  • Unexpected database errors in application logs

Network Indicators:

  • HTTP requests containing SQL injection payloads in 'coin' parameter
  • Unusual outbound database connections from web server

SIEM Query:

source="web_logs" AND (coin="' OR '1'='1" OR coin LIKE "%UNION%" OR coin LIKE "%SELECT%" OR coin LIKE "%INSERT%")

🔗 References

📤 Share & Export