Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65589: n/a

0
Unknown
VulnerabilityCVE-2025-65589cvecve-2025-65589
Published: Tue Dec 16 2025 (12/16/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

nopCommerce 4.90.0 is vulnerable to Cross Site Scripting (XSS) via the Attributes functionality.

AI-Powered Analysis

AILast updated: 12/16/2025, 19:12:33 UTC

Technical Analysis

CVE-2025-65589 identifies a Cross Site Scripting (XSS) vulnerability in nopCommerce version 4.90.0, an open-source e-commerce platform widely used for online retail. The vulnerability exists in the Attributes functionality, which likely handles product attributes or customizable options. XSS vulnerabilities occur when an application does not properly sanitize user-supplied input, allowing attackers to inject malicious JavaScript code that executes in the browsers of other users. This can lead to theft of session cookies, redirection to malicious sites, or execution of unauthorized actions within the victim's session. Although no CVSS score has been assigned and no public exploits are known, the vulnerability is publicly disclosed and reserved under CVE-2025-65589. The lack of a patch link suggests that a fix may not yet be available, increasing the urgency for organizations to implement interim mitigations. The nopCommerce platform is commonly used by small to medium-sized businesses across Europe, making this vulnerability relevant to a broad range of e-commerce operations. Attackers exploiting this vulnerability could compromise customer data confidentiality and integrity, potentially damaging brand reputation and customer trust. The vulnerability does not require authentication to exploit if the Attributes functionality is exposed to unauthenticated users, increasing its risk profile. Given the nature of XSS, user interaction is typically required (e.g., a victim clicking a malicious link), but the impact can be severe if successful.

Potential Impact

For European organizations, the impact of CVE-2025-65589 could be significant, particularly for those operating e-commerce websites using nopCommerce 4.90.0. Successful exploitation could lead to theft of sensitive customer information such as login credentials, personal data, or payment details, undermining GDPR compliance and resulting in regulatory penalties. The integrity of user sessions could be compromised, allowing attackers to perform unauthorized transactions or manipulate user accounts. This can erode customer trust and cause financial losses. Additionally, the vulnerability could be leveraged as a foothold for further attacks within the network. Given the widespread adoption of nopCommerce in Europe, especially among SMEs, the threat could affect a large number of businesses, disrupting online sales and customer engagement. The absence of known exploits currently reduces immediate risk but does not eliminate the potential for future attacks once exploit code becomes available.

Mitigation Recommendations

Organizations should immediately assess their nopCommerce installations to determine if version 4.90.0 is in use and restrict access to the Attributes functionality where possible. Until an official patch is released, implement strict input validation and sanitization on all user inputs related to product attributes to prevent script injection. Deploy Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Regularly monitor web application logs for suspicious activity indicative of XSS attempts. Educate staff and users about the risks of clicking unknown links or submitting untrusted input. Consider using Web Application Firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting nopCommerce. Plan for rapid deployment of patches once available from the nopCommerce development team. Finally, conduct security testing and code reviews focusing on input handling in the Attributes module to identify and remediate similar vulnerabilities proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6941ae5c0d5f6f4391b0c3c5

Added to database: 12/16/2025, 7:09:16 PM

Last enriched: 12/16/2025, 7:12:33 PM

Last updated: 12/16/2025, 8:17:46 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats