CVE-2023-46494: n/a in n/a
Cross Site Scripting vulnerability in EverShop NPM versions before v.1.0.0-rc.5 allows a remote attacker to obtain sensitive information via a crafted request to the ProductGrid function in admin/productGrid/Grid.jsx.
AI Analysis
Technical Summary
CVE-2023-46494 is a Cross-Site Scripting (XSS) vulnerability identified in the EverShop NPM package, specifically affecting versions prior to v1.0.0-rc.5. The vulnerability resides in the ProductGrid function within the admin/productGrid/Grid.jsx component. An attacker can exploit this flaw by sending a specially crafted request that injects malicious scripts into the application interface. When an administrator or user with access to the affected ProductGrid component views the injected content, the malicious script executes in their browser context. This can lead to unauthorized disclosure of sensitive information, such as session tokens, cookies, or other data accessible via the browser environment. The CVSS 3.1 base score for this vulnerability is 6.1, indicating a medium severity level. The vector string (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) shows that the attack can be performed remotely over the network without privileges but requires user interaction (the victim must open or interact with the malicious content). The scope is changed, meaning the vulnerability affects components beyond the initially vulnerable code, and the impact includes limited confidentiality and integrity loss but no availability impact. No known public exploits have been reported yet, and no official patches or updates are linked in the provided data, although the vulnerability is fixed in versions from v1.0.0-rc.5 onward. The underlying weakness is CWE-79, which is a common XSS flaw caused by improper input validation or output encoding in web applications. This vulnerability primarily targets the administrative interface of EverShop, a Node.js package manager module, which suggests that attackers aim to compromise administrative users to gain sensitive information or potentially pivot to further attacks within the affected environment.
Potential Impact
For European organizations using EverShop NPM packages in their e-commerce or administrative web applications, this vulnerability poses a risk of sensitive data leakage and potential session hijacking through XSS attacks. Since the vulnerability affects the administrative ProductGrid interface, attackers could target administrators or privileged users, increasing the risk of unauthorized access or data manipulation. The confidentiality and integrity of sensitive business data, including product information and administrative credentials, could be compromised. Although availability is not directly impacted, the breach of confidentiality and integrity could lead to reputational damage, regulatory non-compliance (e.g., GDPR violations due to data leakage), and financial losses. The requirement for user interaction means phishing or social engineering tactics could be used to trick administrators into triggering the exploit. European organizations with web applications relying on EverShop for product management or inventory control are particularly at risk, especially if they have not updated to patched versions. The medium severity rating suggests that while the vulnerability is serious, it is not trivially exploitable without user interaction, but the potential for lateral movement or further exploitation remains a concern.
Mitigation Recommendations
European organizations should immediately assess their use of EverShop NPM packages and verify the version in use. Upgrading to version 1.0.0-rc.5 or later, where the vulnerability is fixed, is the primary mitigation step. If upgrading is not immediately feasible, organizations should implement strict input validation and output encoding on the ProductGrid component to sanitize any user-supplied data. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser context. Additionally, limit administrative interface access through network segmentation, VPNs, or IP whitelisting to reduce exposure. Educate administrators and users about phishing risks and the importance of cautious interaction with unexpected or suspicious links or content. Regularly monitor logs and web traffic for unusual activity indicative of attempted exploitation. Implement web application firewalls (WAFs) with rules to detect and block XSS attack patterns targeting the affected endpoints. Finally, maintain an incident response plan to quickly address any successful exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2023-46494: n/a in n/a
Description
Cross Site Scripting vulnerability in EverShop NPM versions before v.1.0.0-rc.5 allows a remote attacker to obtain sensitive information via a crafted request to the ProductGrid function in admin/productGrid/Grid.jsx.
AI-Powered Analysis
Technical Analysis
CVE-2023-46494 is a Cross-Site Scripting (XSS) vulnerability identified in the EverShop NPM package, specifically affecting versions prior to v1.0.0-rc.5. The vulnerability resides in the ProductGrid function within the admin/productGrid/Grid.jsx component. An attacker can exploit this flaw by sending a specially crafted request that injects malicious scripts into the application interface. When an administrator or user with access to the affected ProductGrid component views the injected content, the malicious script executes in their browser context. This can lead to unauthorized disclosure of sensitive information, such as session tokens, cookies, or other data accessible via the browser environment. The CVSS 3.1 base score for this vulnerability is 6.1, indicating a medium severity level. The vector string (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) shows that the attack can be performed remotely over the network without privileges but requires user interaction (the victim must open or interact with the malicious content). The scope is changed, meaning the vulnerability affects components beyond the initially vulnerable code, and the impact includes limited confidentiality and integrity loss but no availability impact. No known public exploits have been reported yet, and no official patches or updates are linked in the provided data, although the vulnerability is fixed in versions from v1.0.0-rc.5 onward. The underlying weakness is CWE-79, which is a common XSS flaw caused by improper input validation or output encoding in web applications. This vulnerability primarily targets the administrative interface of EverShop, a Node.js package manager module, which suggests that attackers aim to compromise administrative users to gain sensitive information or potentially pivot to further attacks within the affected environment.
Potential Impact
For European organizations using EverShop NPM packages in their e-commerce or administrative web applications, this vulnerability poses a risk of sensitive data leakage and potential session hijacking through XSS attacks. Since the vulnerability affects the administrative ProductGrid interface, attackers could target administrators or privileged users, increasing the risk of unauthorized access or data manipulation. The confidentiality and integrity of sensitive business data, including product information and administrative credentials, could be compromised. Although availability is not directly impacted, the breach of confidentiality and integrity could lead to reputational damage, regulatory non-compliance (e.g., GDPR violations due to data leakage), and financial losses. The requirement for user interaction means phishing or social engineering tactics could be used to trick administrators into triggering the exploit. European organizations with web applications relying on EverShop for product management or inventory control are particularly at risk, especially if they have not updated to patched versions. The medium severity rating suggests that while the vulnerability is serious, it is not trivially exploitable without user interaction, but the potential for lateral movement or further exploitation remains a concern.
Mitigation Recommendations
European organizations should immediately assess their use of EverShop NPM packages and verify the version in use. Upgrading to version 1.0.0-rc.5 or later, where the vulnerability is fixed, is the primary mitigation step. If upgrading is not immediately feasible, organizations should implement strict input validation and output encoding on the ProductGrid component to sanitize any user-supplied data. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser context. Additionally, limit administrative interface access through network segmentation, VPNs, or IP whitelisting to reduce exposure. Educate administrators and users about phishing risks and the importance of cautious interaction with unexpected or suspicious links or content. Regularly monitor logs and web traffic for unusual activity indicative of attempted exploitation. Implement web application firewalls (WAFs) with rules to detect and block XSS attack patterns targeting the affected endpoints. Finally, maintain an incident response plan to quickly address any successful exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2023-10-23T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6835dda5182aa0cae21866a0
Added to database: 5/27/2025, 3:43:33 PM
Last enriched: 7/6/2025, 3:40:50 AM
Last updated: 7/21/2025, 1:09:27 PM
Views: 5
Related Threats
CVE-2025-54120: CWE-532: Insertion of Sensitive Information into Log File in PCL-Community PCL2-CE
CriticalCVE-2025-43489: CWE-502 Deserialization of Untrusted Data in HP Inc. Poly Clariti Manager
LowCVE-2025-43485: CWE-532 Insertion of Sensitive Information into Log File in HP Inc. Poly Clariti Manager
MediumCVE-2025-43484: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in HP Inc. Poly Clariti Manager
MediumCVE-2025-43483: CWE-321: Use of Hard-coded Cryptographic Key in HP Inc. Poly Clariti Manager
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.