Quick.Cart is vulnerable to Local File Inclusion and Path Traversal issues in the theme selection mechanism. Quick.Cart allows a privileged user to upload arbitrary file contents while only validating the filename extension. This allows an attacker to include and execute uploaded PHP code, resulting in Remote Code Execution on the server.
The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 6.7 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
Metrics
Affected Vendors & Products
References
History
Thu, 22 Jan 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Quick.Cart is vulnerable to Local File Inclusion and Path Traversal issues in the theme selection mechanism. Quick.Cart allows a privileged user to upload arbitrary file contents while only validating the filename extension. This allows an attacker to include and execute uploaded PHP code, resulting in Remote Code Execution on the server. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 6.7 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable. | |
| Title | Remote Code Execution via Local File Inclusion in Quick.Cart | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: CERT-PL
Published:
Updated: 2026-01-22T11:57:28.806Z
Reserved: 2025-12-10T10:33:05.198Z
Link: CVE-2025-67684
No data.
Status : Received
Published: 2026-01-22T12:15:55.417
Modified: 2026-01-22T12:15:55.417
Link: CVE-2025-67684
No data.
OpenCVE Enrichment
No data.