<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2024-58341 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2024-58341/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 25 Mar 2026 16:16:07 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2024-58341/feed.xml" rel="self" type="application/rss+xml"/><item><title>OpenCart Core SQL Injection Vulnerability (CVE-2024-58341)</title><link>https://feed.craftedsignal.io/briefs/2026-03-opencart-sqli/</link><pubDate>Wed, 25 Mar 2026 16:16:07 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-opencart-sqli/</guid><description>OpenCart Core 4.0.2.3 is vulnerable to SQL injection via the 'search' parameter, enabling unauthenticated attackers to manipulate database queries and extract sensitive information through boolean-based or time-based blind SQL injection.</description><content:encoded><![CDATA[<p>OpenCart Core 4.0.2.3 is susceptible to a SQL injection vulnerability that allows unauthenticated remote attackers to inject arbitrary SQL commands through the &lsquo;search&rsquo; parameter. The vulnerability, identified as CVE-2024-58341, allows attackers to craft malicious GET requests to the product search endpoint, potentially leading to the extraction of sensitive database information. The attack relies on the injection of SQL code within the &lsquo;search&rsquo; parameter, exploiting the lack of proper input…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2024-58341</category><category>sql-injection</category><category>opencart</category></item></channel></rss>