# Exploit Title: OpenCart 3.0.3.6 - 'Profile Image' Stored Cross Site Scripting (Authenticated) # Date: 24-11-2020 # Exploit Author: Hemant Patidar (HemantSolo) # Vendor Homepage: https://www.opencart.com/ # Software Link: https://www.opencart.com/index.php?route=cms/download # Version: 3.0.3.6 # Tested on: Windows 10/Kali Linux # CVE: CVE-2020-29471 Vulnerable Parameters: Profile Image. Steps-To-Reproduce: 1. Go to the opencart admin page. 2. Now go to the profile page. * Before the next step write this in notepad "">" and save it as an payload.png 3. Now edit the image and uplaod the image as payload.png. 4. The XSS will be triggered.