CVE-2024-56526
PHP vulnerability analysis and mitigation

Overview

An information disclosure vulnerability was discovered in OXID eShop versions before 7, identified as CVE-2024-56526. The vulnerability occurs when CMS pages in combination with Smarty template engine may inadvertently display sensitive user information if a CMS page contains a Smarty syntax error. The vulnerability was discovered on May 13, 2025 (NIST NVD).

Technical details

The vulnerability stems from PHP's output buffering behavior when exceptions occur. When a Smarty syntax error is present in a plain HTML template, the buffered output gets flushed due to PHP's output control behavior, potentially exposing sensitive information. The vulnerability has been assigned a CVSS v3.1 Base Score of 7.5 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N, indicating remote accessibility with no privileges required. It has been classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) (NIST NVD, Wiz Security).

Impact

The vulnerability can be exploited to expose sensitive user information, particularly in password reset functionality. In a specific example, if the vulnerability is exploited in the password forgot plain HTML template (oxupdatepassinfoplainemail), it can allow an attacker to change the password of any account without notification to the account owner (OXID Bug).

Mitigation and workarounds

Users should upgrade their OXID eShop installations to version 7 or later. Until a patch can be applied, administrators should carefully review and validate all CMS page templates for potential Smarty syntax errors, particularly in sensitive areas such as password reset functionality (NIST NVD).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management