CVE-2025-47289: CWE-1004: Sensitive Cookie Without 'HttpOnly' Flag in CE-PhoenixCart PhoenixCart
CE Phoenix is a free, open-source eCommerce platform. A stored cross-site scripting (XSS) vulnerability was discovered in CE Phoenix versions 1.0.9.9 through 1.1.0.2 where an attacker can inject malicious JavaScript into the testimonial description field. Once submitted, if the shop owner (admin) approves the testimonial, the script executes in the context of any user visiting the testimonial page. Because the session cookies are not marked with the `HttpOnly` flag, they can be exfiltrated by the attacker — potentially leading to account takeover. Version 1.1.0.3 fixes the issue.
AI Analysis
Technical Summary
CVE-2025-47289 is a medium severity vulnerability affecting CE PhoenixCart, an open-source eCommerce platform. The vulnerability exists in versions 1.0.9.9 through 1.1.0.2 and involves a stored cross-site scripting (XSS) flaw in the testimonial description field. An attacker can inject malicious JavaScript code into this field. When the shop owner (admin) approves the testimonial, the malicious script executes in the context of any user who visits the testimonial page. This XSS attack is particularly dangerous because the session cookies used by the platform are not marked with the HttpOnly flag, which normally prevents client-side scripts from accessing cookie data. As a result, the attacker can exfiltrate session cookies, potentially leading to account takeover of users, including administrators. The vulnerability requires that the attacker submit a testimonial and that the admin approves it, which involves some level of privilege and user interaction. The CVSS 3.1 score is 6.3 (medium), reflecting network attack vector, low attack complexity, low privileges required, user interaction needed, and high confidentiality impact but low integrity and no availability impact. The issue is fixed in version 1.1.0.3 of PhoenixCart. No known exploits are reported in the wild yet.
Potential Impact
For European organizations using CE PhoenixCart, this vulnerability poses a significant risk to the confidentiality of user sessions and potentially administrative accounts. Successful exploitation could allow attackers to hijack user sessions, leading to unauthorized access to customer data, order information, and administrative controls. This could result in data breaches, fraud, and loss of customer trust. Since eCommerce platforms handle sensitive payment and personal data, the impact on GDPR compliance and potential regulatory penalties is considerable. The requirement for admin approval of testimonials somewhat limits the attack surface but does not eliminate risk, especially if the admin is tricked or negligent. The lack of HttpOnly flag on cookies exacerbates the risk by allowing cookie theft via XSS. European organizations relying on this platform for online sales must consider the reputational and financial damage from such an attack.
Mitigation Recommendations
1. Immediate upgrade to CE PhoenixCart version 1.1.0.3 or later, which patches the vulnerability. 2. Implement strict input validation and sanitization on all user-submitted content, especially testimonial fields, to prevent injection of malicious scripts. 3. Configure session cookies with the HttpOnly and Secure flags to prevent client-side access and ensure cookies are only sent over HTTPS. 4. Educate administrators to carefully review and verify testimonials before approval to reduce risk of malicious content being published. 5. Employ Content Security Policy (CSP) headers to restrict execution of unauthorized scripts on the site. 6. Monitor logs for suspicious testimonial submissions and unusual admin approval activity. 7. Conduct regular security audits and penetration testing focusing on XSS and session management controls. 8. Consider implementing multi-factor authentication for admin accounts to reduce risk of account takeover.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-47289: CWE-1004: Sensitive Cookie Without 'HttpOnly' Flag in CE-PhoenixCart PhoenixCart
Description
CE Phoenix is a free, open-source eCommerce platform. A stored cross-site scripting (XSS) vulnerability was discovered in CE Phoenix versions 1.0.9.9 through 1.1.0.2 where an attacker can inject malicious JavaScript into the testimonial description field. Once submitted, if the shop owner (admin) approves the testimonial, the script executes in the context of any user visiting the testimonial page. Because the session cookies are not marked with the `HttpOnly` flag, they can be exfiltrated by the attacker — potentially leading to account takeover. Version 1.1.0.3 fixes the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-47289 is a medium severity vulnerability affecting CE PhoenixCart, an open-source eCommerce platform. The vulnerability exists in versions 1.0.9.9 through 1.1.0.2 and involves a stored cross-site scripting (XSS) flaw in the testimonial description field. An attacker can inject malicious JavaScript code into this field. When the shop owner (admin) approves the testimonial, the malicious script executes in the context of any user who visits the testimonial page. This XSS attack is particularly dangerous because the session cookies used by the platform are not marked with the HttpOnly flag, which normally prevents client-side scripts from accessing cookie data. As a result, the attacker can exfiltrate session cookies, potentially leading to account takeover of users, including administrators. The vulnerability requires that the attacker submit a testimonial and that the admin approves it, which involves some level of privilege and user interaction. The CVSS 3.1 score is 6.3 (medium), reflecting network attack vector, low attack complexity, low privileges required, user interaction needed, and high confidentiality impact but low integrity and no availability impact. The issue is fixed in version 1.1.0.3 of PhoenixCart. No known exploits are reported in the wild yet.
Potential Impact
For European organizations using CE PhoenixCart, this vulnerability poses a significant risk to the confidentiality of user sessions and potentially administrative accounts. Successful exploitation could allow attackers to hijack user sessions, leading to unauthorized access to customer data, order information, and administrative controls. This could result in data breaches, fraud, and loss of customer trust. Since eCommerce platforms handle sensitive payment and personal data, the impact on GDPR compliance and potential regulatory penalties is considerable. The requirement for admin approval of testimonials somewhat limits the attack surface but does not eliminate risk, especially if the admin is tricked or negligent. The lack of HttpOnly flag on cookies exacerbates the risk by allowing cookie theft via XSS. European organizations relying on this platform for online sales must consider the reputational and financial damage from such an attack.
Mitigation Recommendations
1. Immediate upgrade to CE PhoenixCart version 1.1.0.3 or later, which patches the vulnerability. 2. Implement strict input validation and sanitization on all user-submitted content, especially testimonial fields, to prevent injection of malicious scripts. 3. Configure session cookies with the HttpOnly and Secure flags to prevent client-side access and ensure cookies are only sent over HTTPS. 4. Educate administrators to carefully review and verify testimonials before approval to reduce risk of malicious content being published. 5. Employ Content Security Policy (CSP) headers to restrict execution of unauthorized scripts on the site. 6. Monitor logs for suspicious testimonial submissions and unusual admin approval activity. 7. Conduct regular security audits and penetration testing focusing on XSS and session management controls. 8. Consider implementing multi-factor authentication for admin accounts to reduce risk of account takeover.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-05-05T16:53:10.374Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683d94ca182aa0cae24279e9
Added to database: 6/2/2025, 12:10:50 PM
Last enriched: 7/9/2025, 12:42:39 PM
Last updated: 8/7/2025, 8:51:08 AM
Views: 24
Related Threats
CVE-2025-8874: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in litonice13 Master Addons – Elementor Addons with White Label, Free Widgets, Hover Effects, Conditions, & Animations
MediumCVE-2025-8767: CWE-1236 Improper Neutralization of Formula Elements in a CSV File in anwppro AnWP Football Leagues
MediumCVE-2025-8482: CWE-862 Missing Authorization in 10up Simple Local Avatars
MediumCVE-2025-8418: CWE-862 Missing Authorization in bplugins B Slider- Gutenberg Slider Block for WP
HighCVE-2025-47444: CWE-201 Insertion of Sensitive Information Into Sent Data in Liquid Web GiveWP
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.