OXID eShop, Information Disclosure, CVE-2025-XXXX (High)

Listen to this Post

How the CVE Works:

The vulnerability (CVE-2025-XXXX) in OXID eShop arises due to improper error handling in Smarty template engine integration. When a CMS page contains a Smarty syntax error, the system fails to suppress sensitive user information in debug or error messages. Attackers can craft malicious requests triggering these errors, leading to unintended exposure of user data such as session tokens, email addresses, or personal details. The flaw affects OXID eShop versions prior to 7.0.0, where Smarty’s debug mode or error reporting inadvertently leaks data instead of displaying a generic error page.

DailyCVE Form:

Platform: OXID eShop
Version: <7.0.0
Vulnerability: Information Disclosure
Severity: High
Date: May 13, 2025

What Undercode Say:

Exploitation:

  1. Trigger Syntax Error: Inject malformed Smarty code in CMS page requests:
    GET /en/cms-page/?param={{malicious_code}} HTTP/1.1
    
  2. Extract Data: Capture leaked data from error responses (e.g., via curl):
    curl -v "http://target.com/en/cms-page/?param={{invalid}}"
    

Mitigation:

1. Patch: Upgrade to OXID eShop ≥7.0.0.

  1. Disable Debug: Set Smarty’s `debugging` and `error_reporting` to `false` in config.inc.php:
    $config['smarty'] = ['debugging' => false, 'error_reporting' => 0];
    
  2. WAF Rules: Block Smarty syntax patterns in CMS requests:
    location ~ {{.}} { deny all; }
    

Detection:

  1. Log Analysis: Search for Smarty errors in server logs:
    grep "Smarty Error" /var/log/oxid/access.log
    

2. Scanner: Use `oxid-scanner` to detect vulnerable instances:

python3 oxid-scanner.py --url http://target.com --check-cve-2025-xxxx

References:

Sources:

Reported By: github.com
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top