CVE-2026-25482: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in craftcms commerce
Craft Commerce is an ecommerce platform for Craft CMS. In versions from 4.0.0-RC1 to 4.10.0 and from 5.0.0 to 5.5.1, a stored DOM XSS vulnerability exists in the "Recent Orders" dashboard widget. The Order Status Name is rendered via JavaScript string concatenation without proper escaping, allowing script execution when any admin visits the dashboard. This issue has been patched in versions 4.10.1 and 5.5.2.
AI Analysis
Technical Summary
CVE-2026-25482 is a stored DOM-based Cross-Site Scripting vulnerability classified under CWE-79, found in Craft Commerce, an ecommerce platform built on Craft CMS. The vulnerability affects versions from 4.0.0-RC1 up to 4.10.0 and 5.0.0 up to 5.5.1. The issue arises in the "Recent Orders" dashboard widget, where the Order Status Name is incorporated into the page using JavaScript string concatenation without proper input sanitization or escaping. This improper neutralization of input allows an attacker to inject malicious JavaScript code that executes in the context of an administrator's browser when they access the dashboard. Because the vulnerability is stored, the malicious payload persists and can affect multiple admin users. Exploitation requires an attacker with the ability to influence order status names, which typically implies some level of authenticated access or manipulation of order data. The vulnerability does not require authentication bypass but does require the victim to be an admin who visits the dashboard widget. The impact includes potential session hijacking, privilege escalation, or further exploitation of the administrative interface. The vulnerability has been addressed in Craft Commerce versions 4.10.1 and 5.5.2 by implementing proper escaping and input validation. No known public exploits have been reported to date. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required (though the vector states PR:H, meaning high privileges required, which aligns with admin access), user interaction required, and high scope impact on confidentiality, integrity, and availability.
Potential Impact
For European organizations using Craft Commerce within their ecommerce infrastructure, this vulnerability poses a significant risk to administrative account security and overall platform integrity. Successful exploitation could lead to execution of arbitrary scripts in admin browsers, enabling session hijacking, theft of sensitive data, or unauthorized actions within the ecommerce system. This could disrupt business operations, lead to data breaches involving customer and order information, and damage organizational reputation. Given the ecommerce context, financial fraud or manipulation of orders is also a potential consequence. The requirement for admin privileges limits the attack surface but does not eliminate risk, especially in environments with multiple administrators or where order status inputs can be influenced by external actors. The vulnerability's presence in widely used versions means many European businesses may be exposed if they have not applied patches. The medium CVSS score reflects moderate impact but should be treated seriously due to the administrative context and potential for chained attacks.
Mitigation Recommendations
European organizations should immediately verify their Craft Commerce version and upgrade to at least 4.10.1 or 5.5.2 to apply the official patch. Until patched, administrators should avoid accessing the "Recent Orders" dashboard widget or restrict access to trusted personnel only. Implement Content Security Policy (CSP) headers to reduce the impact of injected scripts by limiting script execution sources. Review and sanitize all inputs that can influence order status names, including those originating from customers or third-party integrations. Conduct regular audits of administrative accounts and monitor for unusual dashboard activity. Employ web application firewalls (WAFs) with rules targeting XSS payloads specific to Craft Commerce patterns. Additionally, educate administrators about the risks of clicking unknown or suspicious links that could trigger stored XSS payloads. Finally, maintain an incident response plan to quickly address any signs of compromise related to this vulnerability.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden
CVE-2026-25482: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in craftcms commerce
Description
Craft Commerce is an ecommerce platform for Craft CMS. In versions from 4.0.0-RC1 to 4.10.0 and from 5.0.0 to 5.5.1, a stored DOM XSS vulnerability exists in the "Recent Orders" dashboard widget. The Order Status Name is rendered via JavaScript string concatenation without proper escaping, allowing script execution when any admin visits the dashboard. This issue has been patched in versions 4.10.1 and 5.5.2.
AI-Powered Analysis
Technical Analysis
CVE-2026-25482 is a stored DOM-based Cross-Site Scripting vulnerability classified under CWE-79, found in Craft Commerce, an ecommerce platform built on Craft CMS. The vulnerability affects versions from 4.0.0-RC1 up to 4.10.0 and 5.0.0 up to 5.5.1. The issue arises in the "Recent Orders" dashboard widget, where the Order Status Name is incorporated into the page using JavaScript string concatenation without proper input sanitization or escaping. This improper neutralization of input allows an attacker to inject malicious JavaScript code that executes in the context of an administrator's browser when they access the dashboard. Because the vulnerability is stored, the malicious payload persists and can affect multiple admin users. Exploitation requires an attacker with the ability to influence order status names, which typically implies some level of authenticated access or manipulation of order data. The vulnerability does not require authentication bypass but does require the victim to be an admin who visits the dashboard widget. The impact includes potential session hijacking, privilege escalation, or further exploitation of the administrative interface. The vulnerability has been addressed in Craft Commerce versions 4.10.1 and 5.5.2 by implementing proper escaping and input validation. No known public exploits have been reported to date. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required (though the vector states PR:H, meaning high privileges required, which aligns with admin access), user interaction required, and high scope impact on confidentiality, integrity, and availability.
Potential Impact
For European organizations using Craft Commerce within their ecommerce infrastructure, this vulnerability poses a significant risk to administrative account security and overall platform integrity. Successful exploitation could lead to execution of arbitrary scripts in admin browsers, enabling session hijacking, theft of sensitive data, or unauthorized actions within the ecommerce system. This could disrupt business operations, lead to data breaches involving customer and order information, and damage organizational reputation. Given the ecommerce context, financial fraud or manipulation of orders is also a potential consequence. The requirement for admin privileges limits the attack surface but does not eliminate risk, especially in environments with multiple administrators or where order status inputs can be influenced by external actors. The vulnerability's presence in widely used versions means many European businesses may be exposed if they have not applied patches. The medium CVSS score reflects moderate impact but should be treated seriously due to the administrative context and potential for chained attacks.
Mitigation Recommendations
European organizations should immediately verify their Craft Commerce version and upgrade to at least 4.10.1 or 5.5.2 to apply the official patch. Until patched, administrators should avoid accessing the "Recent Orders" dashboard widget or restrict access to trusted personnel only. Implement Content Security Policy (CSP) headers to reduce the impact of injected scripts by limiting script execution sources. Review and sanitize all inputs that can influence order status names, including those originating from customers or third-party integrations. Conduct regular audits of administrative accounts and monitor for unusual dashboard activity. Employ web application firewalls (WAFs) with rules targeting XSS payloads specific to Craft Commerce patterns. Additionally, educate administrators about the risks of clicking unknown or suspicious links that could trigger stored XSS payloads. Finally, maintain an incident response plan to quickly address any signs of compromise related to this vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-02T16:31:35.821Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69823eb3f9fa50a62fd8ce6e
Added to database: 2/3/2026, 6:30:11 PM
Last enriched: 2/3/2026, 6:47:17 PM
Last updated: 2/5/2026, 2:06:48 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1927: CWE-862 Missing Authorization in wpsoul Greenshift – animation and page builder blocks
MediumCVE-2026-1523: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in PRIMION DIGITEK Digitek ADT1100
HighCVE-2025-13379: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in IBM Aspera Console
HighVS Code Configs Expose GitHub Codespaces to Attacks
MediumItaly Averted Russian-Linked Cyberattacks Targeting Winter Olympics Websites, Foreign Minister Says
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.