Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21290: Cross-site Scripting (Stored XSS) (CWE-79) in Adobe Adobe Commerce

0
High
VulnerabilityCVE-2026-21290cvecve-2026-21290cwe-79
Published: Wed Mar 11 2026 (03/11/2026, 02:19:14 UTC)
Source: CVE Database V5
Vendor/Project: Adobe
Product: Adobe Commerce

Description

Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality, and integrity impact to high. Exploitation of this issue requires user interaction in that a victim must browse to the page containing the vulnerable field.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/18/2026, 19:23:25 UTC

Technical Analysis

CVE-2026-21290 is a stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79, impacting Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16, and earlier. The vulnerability allows a low-privileged attacker to inject malicious JavaScript code into vulnerable form fields within the Adobe Commerce platform. When a user visits a page containing the injected script, the malicious code executes in their browser context. This can lead to session hijacking, allowing attackers to impersonate users, steal sensitive information, or perform unauthorized actions. The attack requires user interaction, meaning the victim must navigate to the compromised page for the exploit to succeed. The vulnerability has a CVSS v3.1 score of 8.7, indicating high severity due to its network attack vector, low attack complexity, low privileges required, and the need for user interaction. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. The confidentiality and integrity impacts are high, while availability is not affected. No patches or exploits are currently publicly available, but the vulnerability's presence in widely used Adobe Commerce versions makes it a significant risk. Organizations relying on Adobe Commerce for e-commerce operations should monitor for updates and consider immediate mitigations to reduce exposure.

Potential Impact

The impact of CVE-2026-21290 is substantial for organizations using affected Adobe Commerce versions. Successful exploitation can lead to session hijacking, allowing attackers to impersonate legitimate users, including administrators or customers, resulting in unauthorized access to sensitive data such as personal information, payment details, and order histories. This compromises confidentiality and integrity of data and transactions. Attackers could also manipulate user sessions to perform fraudulent activities or inject further malicious payloads. The vulnerability affects the availability indirectly by undermining trust in the platform. Given Adobe Commerce's widespread use in global e-commerce, the threat could disrupt business operations, damage brand reputation, and lead to financial losses. The requirement for user interaction limits automated mass exploitation but targeted phishing or social engineering campaigns could increase risk. Organizations without timely mitigation may face increased risk of data breaches and regulatory penalties related to data protection laws.

Mitigation Recommendations

To mitigate CVE-2026-21290, organizations should: 1) Apply official Adobe patches or updates as soon as they become available to remediate the vulnerability. 2) Implement strict input validation and output encoding on all user-supplied data in form fields to prevent script injection. 3) Employ Content Security Policy (CSP) headers to restrict execution of unauthorized scripts in browsers. 4) Use Web Application Firewalls (WAFs) configured to detect and block XSS payloads targeting Adobe Commerce endpoints. 5) Conduct regular security audits and penetration testing focusing on XSS vulnerabilities in the e-commerce platform. 6) Educate users and administrators about phishing risks and safe browsing practices to reduce successful exploitation via social engineering. 7) Monitor logs and user activity for suspicious behavior indicative of session hijacking or unauthorized access. 8) Isolate administrative interfaces and restrict access by IP or VPN to reduce exposure. These measures combined will reduce the attack surface and limit the impact of potential exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
adobe
Date Reserved
2025-12-12T22:01:18.190Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b0de272f860ef9430a0ac6

Added to database: 3/11/2026, 3:14:47 AM

Last enriched: 3/18/2026, 7:23:25 PM

Last updated: 4/28/2026, 7:25:27 AM

Views: 51

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses