{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-0580","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-01-19T19:54:37.808Z","datePublished":"2025-01-20T02:31:05.900Z","dateUpdated":"2025-01-21T20:23:23.261Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-01-20T02:31:05.900Z"},"title":"Shiprocket Module REST API Module rest_api authorization","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-863","lang":"en","description":"Incorrect Authorization"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-285","lang":"en","description":"Improper Authorization"}]}],"affected":[{"vendor":"n/a","product":"Shiprocket Module","versions":[{"version":"3","status":"affected"}],"modules":["REST API Module"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in Shiprocket Module 3 on OpenCart. It has been rated as critical. Affected by this issue is some unknown functionality of the file /index.php?route=extension/module/rest_api&action=getOrders of the component REST API Module. The manipulation of the argument contentHash leads to incorrect authorization. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"Eine kritische Schwachstelle wurde in Shiprocket Module 3 für OpenCart ausgemacht. Betroffen davon ist ein unbekannter Prozess der Datei /index.php?route=extension/module/rest_api&action=getOrders der Komponente REST API Module. Durch das Beeinflussen des Arguments contentHash mit unbekannten Daten kann eine incorrect authorization-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Die Komplexität eines Angriffs ist eher hoch. Sie ist schwierig ausnutzbar. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.3,"vectorString":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":5.6,"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5.6,"vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5.1,"vectorString":"AV:N/AC:H/Au:N/C:P/I:P/A:P"}}],"timeline":[{"time":"2025-01-19T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-01-19T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-01-19T20:59:46.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"mcdruid (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.292598","name":"VDB-292598 | Shiprocket Module REST API Module rest_api authorization","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.292598","name":"VDB-292598 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.476832","name":"Submit #476832 | ShipRocket OpenCart module v3 Incorrect Authorization","tags":["third-party-advisory"]},{"url":"https://gist.github.com/mcdruid/0d1fdbba445587639ee5da66e7abfcc9","tags":["exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-01-21T20:23:19.205768Z","id":"CVE-2025-0580","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-01-21T20:23:23.261Z"}}]}}