Description
The bindReplace function in the query factory in includes/classes/database.php in Loaded Commerce 7 does not properly handle : (colon) characters, which allows remote authenticated users to conduct SQL injection attacks via the First name and Last name fields in the address book.
Exploits (1)
exploitdb
WORKING POC
by Breaking.Technology · textwebappsphp
https://www.exploit-db.com/exploits/34552
References (5)
Core 5
Core References
Exploit, Third Party Advisory, VDB Entry x_refsource_misc
http://packetstormsecurity.com/files/128183/Loaded-Commerce-7-Shopping-Cart-SQL-Injection.html
Patch, Third Party Advisory x_refsource_misc
http://resources.infosecinstitute.com/exploiting-systemic-query-vulnerabilities-attempt-re-invent-pdo/
Exploit, Third Party Advisory, VDB Entry x_refsource_misc
http://www.exploit-db.com/exploits/34552
Third Party Advisory, VDB Entry x_refsource_misc
https://exchange.xforce.ibmcloud.com/vulnerabilities/95791
Patch, Third Party Advisory x_refsource_misc
https://github.com/loadedcommerce/loaded7/pull/520
Scores
CVSS v3
8.8
EPSS
0.0105
EPSS Percentile
77.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-89
Status
published
Products (1)
loadedcommerce/loaded7
Published
Jan 03, 2020
Tracked Since
Feb 18, 2026