CVE-2018-25114
osCommerce 2.3.4.1 Installer Unauthenticated Configuration File Injection PHP Code Execution
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
A remote code execution vulnerability exists within osCommerce Online Merchant version 2.3.4.1 due to insecure default configuration and missing authentication in the installer workflow. By default, the /install/ directory remains accessible after installation. An unauthenticated attacker can invoke install_4.php, submit crafted POST data, and inject arbitrary PHP code into the configure.php file. When the application later includes this file, the injected payload is executed, resulting in full server-side compromise.
| CWE | CWE-434 CWE-94 |
| Vendor | oscommerce |
| Product | online merchant |
| Published | Jul 23, 2025 |
| Last Updated | Apr 7, 2026 |
Stay Ahead of the Next One
Get instant alerts for oscommerce online merchant
Be the first to know when new unknown vulnerabilities affecting oscommerce online merchant are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
osCommerce / Online Merchant
2.3.4.1
References
exploit-db.com: https://www.exploit-db.com/exploits/44374 oscommerce.com: https://www.oscommerce.com/ raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/oscommerce_installer_unauth_code_exec.rb vulncheck.com: https://www.vulncheck.com/advisories/oscommerce-installer-unauth-config-file-injection-php-code-execution
Credits
Simon Scannell