Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65591: n/a

0
Medium
VulnerabilityCVE-2025-65591cvecve-2025-65591
Published: Tue Dec 16 2025 (12/16/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

nopCommerce 4.90.0 is vulnerable to Cross Site Scripting (XSS) via the Currencies functionality.

AI-Powered Analysis

AILast updated: 12/16/2025, 18:41:09 UTC

Technical Analysis

CVE-2025-65591 identifies a Cross Site Scripting (XSS) vulnerability in nopCommerce version 4.90.0, specifically within the Currencies functionality. nopCommerce is an open-source e-commerce platform widely used for online retail operations. The vulnerability arises because the application fails to properly sanitize or encode user-supplied input related to currency data, allowing attackers to inject malicious JavaScript code. When a victim accesses a page that processes or displays this malicious input, the injected script executes in their browser context. This can lead to theft of session cookies, redirection to phishing sites, or execution of unauthorized actions on behalf of the user. Although no CVSS score or patch is currently available, the vulnerability is publicly disclosed and reserved by MITRE as of November 2025. No known exploits have been reported in the wild, but the nature of XSS vulnerabilities makes them relatively easy to exploit, especially in environments with high user interaction. The absence of authentication requirements or complex prerequisites further increases the risk. The vulnerability compromises confidentiality and integrity primarily, with potential availability impacts if leveraged for broader attacks such as malware distribution or denial of service. nopCommerce’s role in managing e-commerce transactions means that exploitation could damage customer trust, lead to financial fraud, and expose sensitive business data. The lack of immediate patches necessitates proactive mitigation by affected organizations.

Potential Impact

For European organizations, the impact of this XSS vulnerability in nopCommerce 4.90.0 can be significant. E-commerce platforms are critical for business operations, and exploitation could lead to customer data theft, including personal and payment information, undermining GDPR compliance and resulting in regulatory penalties. Attackers could hijack user sessions, perform fraudulent transactions, or inject malicious content that damages brand reputation. The integrity of pricing and currency data could be compromised, causing financial discrepancies. Additionally, the vulnerability could be used as a foothold for further attacks within the corporate network. Given the widespread use of nopCommerce in Europe, especially among small and medium enterprises, the risk extends to a broad range of sectors including retail, services, and digital goods. The potential for customer trust erosion and financial loss makes this vulnerability a high priority for mitigation.

Mitigation Recommendations

To mitigate CVE-2025-65591, organizations should first verify if they are running nopCommerce version 4.90.0 and assess exposure of the Currencies functionality to untrusted input. Immediate steps include implementing strict input validation and output encoding for all currency-related fields to prevent script injection. Deploying a Web Application Firewall (WAF) with robust XSS detection and blocking capabilities can provide an additional protective layer. Monitoring web logs and user activity for unusual patterns indicative of XSS exploitation attempts is critical. Organizations should also prepare to apply patches or updates from nopCommerce as soon as they become available. In the interim, consider disabling or restricting access to the vulnerable Currencies feature if feasible. Educating developers and administrators about secure coding practices and regular security testing, including automated scanning for XSS vulnerabilities, will reduce future risks. Finally, ensure incident response plans include procedures for handling XSS incidents to minimize damage.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6941a4041a61eff6269a933a

Added to database: 12/16/2025, 6:25:08 PM

Last enriched: 12/16/2025, 6:41:09 PM

Last updated: 12/17/2025, 9:29:18 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats