PatchSiren

PatchSiren cyber security CVE debrief

CVE-2021-47928 Exploit Db CVE debrief

CVE-2021-47928 is a high-severity SQL injection issue affecting OpenCart TMD Vendor System 3.x. According to the CVE record, an unauthenticated attacker can inject SQL through the product_id parameter and use blind techniques to extract database data, including usernames, email addresses, and password reset codes from the oc_user table. Because the issue is network-reachable, requires no authentication, and is tied to sensitive account data, it should be treated as urgent for any exposed deployment.

Vendor
Exploit Db
Product
Unknown
CVSS
HIGH 8.8
CISA KEV
Not listed in stored evidence
Original CVE published
2026-05-10
Original CVE updated
2026-05-10
Advisory published
2026-05-10
Advisory updated
2026-05-10

Who should care

OpenCart site owners using TMD Vendor System 3.x, application security teams, and administrators responsible for the underlying database and web application logs.

Technical summary

The CVE record describes a blind SQL injection in the product_id parameter. The NVD record classifies the issue as network exploitable with no privileges or user interaction required, and the linked description says attackers can use time-based or content-based inference to read data from the database. The cited impact includes exposure of usernames, emails, and password reset codes from oc_user, which aligns with CWE-89 and the reported 8.8 HIGH severity.

Defensive priority

Immediate

Recommended defensive actions

  • Identify whether any deployed OpenCart instance uses TMD Vendor System 3.x and treat exposed installations as at risk.
  • Apply the vendor or advisory guidance linked in the disclosure references, and upgrade or remove the affected extension if a fixed version is available.
  • Validate and parameterize all handling of product_id and other request parameters; do not concatenate user input into SQL queries.
  • Restrict the database account used by the application to the minimum permissions needed.
  • Monitor for abnormal response timing, repeated parameter probing, and database errors that may indicate blind SQL injection attempts.
  • Review authentication, password reset, and user-account logs for signs of data exposure, and force credential resets if compromise is suspected.

Evidence notes

The debrief is based on the supplied CVE description and the NVD modified record for CVE-2021-47928, which lists CWE-89 and a CVSS 4.0 vector indicating network access, no privileges, and no user interaction. Linked references include an Exploit-DB entry (50493), the OpenCart Extensions site, and a VulnCheck advisory URL. No additional product behavior or patch details were assumed beyond the provided corpus.

Official resources

Public disclosure is reflected in the linked Exploit-DB entry and VulnCheck advisory reference. The CVE record in the supplied corpus was published and modified on 2026-05-10T13:16:28.863Z.