Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65589: n/a

0
Medium
VulnerabilityCVE-2025-65589cvecve-2025-65589
Published: Tue Dec 16 2025 (12/16/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

nopCommerce 4.90.0 is vulnerable to Cross Site Scripting (XSS) via the Attributes functionality.

AI-Powered Analysis

AILast updated: 12/23/2025, 19:25:24 UTC

Technical Analysis

CVE-2025-65589 identifies a Cross Site Scripting (XSS) vulnerability in nopCommerce version 4.90.0, specifically within the Attributes functionality. XSS vulnerabilities arise when an application fails to properly sanitize user-supplied input, allowing attackers to inject malicious scripts that execute in the browsers of other users. In this case, the Attributes feature, which likely allows customization or specification of product attributes, does not sufficiently validate or encode input, enabling injection of executable JavaScript code. The vulnerability is remotely exploitable over the network without requiring authentication (AV:N/PR:N), but user interaction is necessary (UI:R), such as a victim viewing a manipulated attribute on a product page. The scope is changed (S:C), indicating that the vulnerability can affect resources beyond the initially vulnerable component, potentially impacting user sessions or data confidentiality and integrity. The CVSS vector indicates low attack complexity (AC:L), meaning exploitation is straightforward for an attacker with basic skills. The impact on confidentiality and integrity is partial (C:L/I:L), as attackers can steal cookies, perform actions on behalf of users, or manipulate displayed content, but availability is not affected (A:N). No patches or known exploits are currently reported, but the vulnerability is publicly disclosed as of December 16, 2025. The CWE-79 classification confirms this is a classic reflected or stored XSS issue. Organizations using nopCommerce 4.90.0 should consider this a significant risk, especially in e-commerce contexts where user trust and data protection are critical.

Potential Impact

For European organizations, the impact of this XSS vulnerability can be significant, especially for those operating e-commerce platforms using nopCommerce 4.90.0. Successful exploitation can lead to theft of user credentials, session hijacking, and unauthorized actions performed on behalf of legitimate users, undermining customer trust and potentially leading to financial losses and reputational damage. The partial compromise of confidentiality and integrity can also expose sensitive customer data or allow manipulation of product information, which may violate GDPR requirements and result in regulatory penalties. Although availability is not impacted, the indirect consequences of data breaches or fraud can disrupt business operations. The requirement for user interaction means phishing or social engineering tactics could be used to lure victims to maliciously crafted pages. Given the widespread use of nopCommerce in European SMB and mid-market e-commerce sectors, the threat surface is considerable. Organizations failing to address this vulnerability risk targeted attacks exploiting this flaw to gain footholds or escalate privileges within their web applications.

Mitigation Recommendations

To mitigate CVE-2025-65589, organizations should first verify if they are running nopCommerce version 4.90.0 and plan immediate upgrades once an official patch is released. In the absence of a patch, implement strict input validation on all attribute fields to reject or sanitize potentially malicious scripts. Employ context-aware output encoding (e.g., HTML entity encoding) when rendering attribute data in web pages to prevent script execution. Use Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of XSS attacks. Regularly audit and monitor web application logs for unusual input patterns or user behavior indicative of exploitation attempts. Educate users about phishing risks and encourage cautious interaction with links or inputs from untrusted sources. Additionally, consider deploying Web Application Firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting nopCommerce attributes. Finally, maintain an incident response plan to quickly address any detected exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6941ae5c0d5f6f4391b0c3c5

Added to database: 12/16/2025, 7:09:16 PM

Last enriched: 12/23/2025, 7:25:24 PM

Last updated: 2/7/2026, 4:20:58 AM

Views: 82

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats