PatchSiren

PatchSiren cyber security CVE debrief

CVE-2018-25336 Unknown Vendor CVE debrief

CVE-2018-25336 describes a cross-site request forgery issue in jCart for OpenCart that can let an attacker induce a victim to submit account-changing requests. According to the source record, this can affect user credentials, passwords, and affiliate account details without requiring attacker authentication. The issue is rated CVSS 6.9 (Medium) and is tracked as CWE-352.

Vendor
Unknown Vendor
Product
Unknown
CVSS
MEDIUM 6.9
CISA KEV
Not listed in stored evidence
Original CVE published
2026-05-17
Original CVE updated
2026-05-18
Advisory published
2026-05-17
Advisory updated
2026-05-18

Who should care

Administrators and developers running jCart for OpenCart deployments, especially any installation that exposes customer account settings, password changes, or affiliate management features.

Technical summary

The NVD record and referenced VulnCheck advisory describe a CSRF weakness in the Joomla jCart for OpenCart extension. Because the affected actions do not appear to require a valid anti-CSRF check, an attacker can lure a logged-in victim to an attacker-controlled page that submits unwanted requests to account-management endpoints. The source description indicates the impact can include changes to account information, passwords, and affiliate details. The available corpus does not provide verified endpoint names or a confirmed vendor identity beyond a weak Joomla-related reference.

Defensive priority

Medium

Recommended defensive actions

  • Verify whether jCart for OpenCart is installed and whether the affected version is in use; replace or remove the extension if no longer supported.
  • Ensure all sensitive state-changing requests use per-request anti-CSRF tokens and server-side validation.
  • Require reauthentication or step-up confirmation for password, email, and affiliate-account changes.
  • Review cookie and session settings, including SameSite behavior, as a defense-in-depth control.
  • Audit logs for unexpected changes to customer or affiliate account data.
  • If a fixed version is available from the project or vendor, apply it promptly and retest account-management flows.

Evidence notes

This debrief is based on the supplied NVD modified record and its referenced sources. The record identifies CWE-352 and describes a CSRF issue in jCart for OpenCart; however, the vendor/project identity is only weakly supported in the corpus, and the specific affected endpoints are not listed in the provided text.

Official resources

Public vulnerability record sourced from the NVD modified feed, with references attributed in the supplied corpus to VulnCheck and related public advisory links. No KEV listing was provided in the source data.