Quick.Cart is vulnerable to Local File Inclusion and Path Traversal issues in the theme selection mechanism. Quick.Cart allows a privileged user to upload arbitrary file contents while only validating the filename extension. This allows an attacker to include and execute uploaded PHP code, resulting in Remote Code Execution on the server. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 6.7 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
History

Thu, 22 Jan 2026 12:15:00 +0000

Type Values Removed Values Added
Description Quick.Cart is vulnerable to Local File Inclusion and Path Traversal issues in the theme selection mechanism. Quick.Cart allows a privileged user to upload arbitrary file contents while only validating the filename extension. This allows an attacker to include and execute uploaded PHP code, resulting in Remote Code Execution on the server. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 6.7 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
Title Remote Code Execution via Local File Inclusion in Quick.Cart
Weaknesses CWE-22
References
Metrics cvssV4_0

{'score': 9.4, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CERT-PL

Published:

Updated: 2026-01-22T11:57:28.806Z

Reserved: 2025-12-10T10:33:05.198Z

Link: CVE-2025-67684

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-01-22T12:15:55.417

Modified: 2026-01-22T12:15:55.417

Link: CVE-2025-67684

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.