๐Ÿ” CVE Alert

CVE-2018-25114

UNKNOWN 0.0

osCommerce 2.3.4.1 Installer Unauthenticated Configuration File Injection PHP Code Execution

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

A remote code execution vulnerability exists within osCommerce Online Merchant version 2.3.4.1 due to insecure default configuration and missing authentication in the installer workflow. By default, the /install/ directory remains accessible after installation. An unauthenticated attacker can invoke install_4.php, submit crafted POST data, and inject arbitrary PHP code into the configure.php file. When the application later includes this file, the injected payload is executed, resulting in full server-side compromise.

CWE CWE-434 CWE-94
Vendor oscommerce
Product online merchant
Published Jul 23, 2025
Last Updated Apr 7, 2026
Stay Ahead of the Next One

Get instant alerts for oscommerce online merchant

Be the first to know when new unknown vulnerabilities affecting oscommerce online merchant are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

osCommerce / Online Merchant
2.3.4.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
exploit-db.com: https://www.exploit-db.com/exploits/44374 oscommerce.com: https://www.oscommerce.com/ raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/oscommerce_installer_unauth_code_exec.rb vulncheck.com: https://www.vulncheck.com/advisories/oscommerce-installer-unauth-config-file-injection-php-code-execution

Credits

Simon Scannell