Skip to main content

CVE-2025-47289: CWE-1004: Sensitive Cookie Without 'HttpOnly' Flag in CE-PhoenixCart PhoenixCart

Medium
VulnerabilityCVE-2025-47289cvecve-2025-47289cwe-1004
Published: Mon Jun 02 2025 (06/02/2025, 11:00:20 UTC)
Source: CVE Database V5
Vendor/Project: CE-PhoenixCart
Product: PhoenixCart

Description

CE Phoenix is a free, open-source eCommerce platform. A stored cross-site scripting (XSS) vulnerability was discovered in CE Phoenix versions 1.0.9.9 through 1.1.0.2 where an attacker can inject malicious JavaScript into the testimonial description field. Once submitted, if the shop owner (admin) approves the testimonial, the script executes in the context of any user visiting the testimonial page. Because the session cookies are not marked with the `HttpOnly` flag, they can be exfiltrated by the attacker — potentially leading to account takeover. Version 1.1.0.3 fixes the issue.

AI-Powered Analysis

AILast updated: 07/09/2025, 12:42:39 UTC

Technical Analysis

CVE-2025-47289 is a medium severity vulnerability affecting CE PhoenixCart, an open-source eCommerce platform. The vulnerability exists in versions 1.0.9.9 through 1.1.0.2 and involves a stored cross-site scripting (XSS) flaw in the testimonial description field. An attacker can inject malicious JavaScript code into this field. When the shop owner (admin) approves the testimonial, the malicious script executes in the context of any user who visits the testimonial page. This XSS attack is particularly dangerous because the session cookies used by the platform are not marked with the HttpOnly flag, which normally prevents client-side scripts from accessing cookie data. As a result, the attacker can exfiltrate session cookies, potentially leading to account takeover of users, including administrators. The vulnerability requires that the attacker submit a testimonial and that the admin approves it, which involves some level of privilege and user interaction. The CVSS 3.1 score is 6.3 (medium), reflecting network attack vector, low attack complexity, low privileges required, user interaction needed, and high confidentiality impact but low integrity and no availability impact. The issue is fixed in version 1.1.0.3 of PhoenixCart. No known exploits are reported in the wild yet.

Potential Impact

For European organizations using CE PhoenixCart, this vulnerability poses a significant risk to the confidentiality of user sessions and potentially administrative accounts. Successful exploitation could allow attackers to hijack user sessions, leading to unauthorized access to customer data, order information, and administrative controls. This could result in data breaches, fraud, and loss of customer trust. Since eCommerce platforms handle sensitive payment and personal data, the impact on GDPR compliance and potential regulatory penalties is considerable. The requirement for admin approval of testimonials somewhat limits the attack surface but does not eliminate risk, especially if the admin is tricked or negligent. The lack of HttpOnly flag on cookies exacerbates the risk by allowing cookie theft via XSS. European organizations relying on this platform for online sales must consider the reputational and financial damage from such an attack.

Mitigation Recommendations

1. Immediate upgrade to CE PhoenixCart version 1.1.0.3 or later, which patches the vulnerability. 2. Implement strict input validation and sanitization on all user-submitted content, especially testimonial fields, to prevent injection of malicious scripts. 3. Configure session cookies with the HttpOnly and Secure flags to prevent client-side access and ensure cookies are only sent over HTTPS. 4. Educate administrators to carefully review and verify testimonials before approval to reduce risk of malicious content being published. 5. Employ Content Security Policy (CSP) headers to restrict execution of unauthorized scripts on the site. 6. Monitor logs for suspicious testimonial submissions and unusual admin approval activity. 7. Conduct regular security audits and penetration testing focusing on XSS and session management controls. 8. Consider implementing multi-factor authentication for admin accounts to reduce risk of account takeover.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-05-05T16:53:10.374Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683d94ca182aa0cae24279e9

Added to database: 6/2/2025, 12:10:50 PM

Last enriched: 7/9/2025, 12:42:39 PM

Last updated: 8/7/2025, 8:51:08 AM

Views: 24

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats