CVE-2026-25483: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in craftcms commerce
Craft Commerce is an ecommerce platform for Craft CMS. In versions from 4.0.0-RC1 to 4.10.0 and from 5.0.0 to 5.5.1, a stored XSS vulnerability exists in Craft Commerce’s Order Status History Message. The message is rendered using the |md filter, which permits raw HTML, enabling malicious script execution. If a user has database backup utility permissions (which do not require an elevated session), an attacker can exfiltrate the entire database, including all user credentials, customer PII, order history, and 2FA recovery codes. This issue has been patched in versions 4.10.1 and 5.5.2.
AI Analysis
Technical Summary
CVE-2026-25483 is a stored cross-site scripting (XSS) vulnerability identified in Craft Commerce, an ecommerce platform built on Craft CMS. The vulnerability affects versions from 4.0.0-RC1 up to 4.10.0 and from 5.0.0 up to 5.5.1. The root cause lies in the Order Status History Message feature, which uses the |md filter to render messages. This filter permits raw HTML content, which allows an attacker to inject malicious scripts that execute in the context of users viewing the order status history. The exploitation scenario requires the attacker to have database backup utility permissions, which notably do not require an elevated session or administrative privileges, lowering the barrier to exploitation. By leveraging this XSS, an attacker can execute scripts that exfiltrate sensitive data, including the entire database containing user credentials, customer personally identifiable information (PII), order histories, and two-factor authentication (2FA) recovery codes. This level of access can lead to full account compromise and data breaches. The vulnerability has been addressed and patched in Craft Commerce versions 4.10.1 and 5.5.2. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no authentication required (AT:N), but some privileges needed (PR:L), and user interaction required (UI:P). The scope is limited (SI:L), with no impact on confidentiality, integrity, or availability metrics directly (VC:N/VI:N/VA:N), but the overall impact is significant due to data exposure. No known exploits have been reported in the wild as of the publication date. The vulnerability is classified under CWE-79, which covers improper neutralization of input during web page generation leading to XSS.
Potential Impact
For European organizations using affected versions of Craft Commerce, this vulnerability poses a significant risk of data breach and account compromise. The ability to exfiltrate the entire database means that sensitive customer data, including PII and 2FA recovery codes, can be stolen, potentially leading to identity theft, fraud, and unauthorized access to user accounts. Ecommerce businesses relying on Craft Commerce may suffer reputational damage, regulatory penalties under GDPR for inadequate data protection, and operational disruption. The fact that database backup permissions do not require elevated privileges increases the risk that internal users or attackers who gain limited access can exploit this vulnerability. This could lead to widespread data leakage across multiple clients or customers. Additionally, the stored XSS could be used to pivot attacks within the organization’s network or to deliver further malware payloads. The medium CVSS score reflects the need for some privileges and user interaction, but the high impact on confidentiality and potential regulatory consequences make this a critical concern for data-sensitive ecommerce operations in Europe.
Mitigation Recommendations
1. Immediately upgrade Craft Commerce installations to versions 4.10.1 or 5.5.2 or later, where the vulnerability is patched. 2. Audit and restrict database backup utility permissions to only trusted administrators; avoid granting these permissions broadly or to non-administrative users. 3. Implement strict input validation and output encoding on all user-supplied content, especially in order status messages, to prevent injection of raw HTML or scripts. 4. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in the web application context. 5. Monitor logs for unusual activity related to order status messages or database backup operations to detect potential exploitation attempts. 6. Conduct regular security reviews and penetration testing focusing on web application input handling and privilege management. 7. Educate staff about the risks of granting excessive permissions and the importance of applying security patches promptly. 8. Consider isolating the database backup functionality behind additional authentication or network segmentation to reduce exposure.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden
CVE-2026-25483: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in craftcms commerce
Description
Craft Commerce is an ecommerce platform for Craft CMS. In versions from 4.0.0-RC1 to 4.10.0 and from 5.0.0 to 5.5.1, a stored XSS vulnerability exists in Craft Commerce’s Order Status History Message. The message is rendered using the |md filter, which permits raw HTML, enabling malicious script execution. If a user has database backup utility permissions (which do not require an elevated session), an attacker can exfiltrate the entire database, including all user credentials, customer PII, order history, and 2FA recovery codes. This issue has been patched in versions 4.10.1 and 5.5.2.
AI-Powered Analysis
Technical Analysis
CVE-2026-25483 is a stored cross-site scripting (XSS) vulnerability identified in Craft Commerce, an ecommerce platform built on Craft CMS. The vulnerability affects versions from 4.0.0-RC1 up to 4.10.0 and from 5.0.0 up to 5.5.1. The root cause lies in the Order Status History Message feature, which uses the |md filter to render messages. This filter permits raw HTML content, which allows an attacker to inject malicious scripts that execute in the context of users viewing the order status history. The exploitation scenario requires the attacker to have database backup utility permissions, which notably do not require an elevated session or administrative privileges, lowering the barrier to exploitation. By leveraging this XSS, an attacker can execute scripts that exfiltrate sensitive data, including the entire database containing user credentials, customer personally identifiable information (PII), order histories, and two-factor authentication (2FA) recovery codes. This level of access can lead to full account compromise and data breaches. The vulnerability has been addressed and patched in Craft Commerce versions 4.10.1 and 5.5.2. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no authentication required (AT:N), but some privileges needed (PR:L), and user interaction required (UI:P). The scope is limited (SI:L), with no impact on confidentiality, integrity, or availability metrics directly (VC:N/VI:N/VA:N), but the overall impact is significant due to data exposure. No known exploits have been reported in the wild as of the publication date. The vulnerability is classified under CWE-79, which covers improper neutralization of input during web page generation leading to XSS.
Potential Impact
For European organizations using affected versions of Craft Commerce, this vulnerability poses a significant risk of data breach and account compromise. The ability to exfiltrate the entire database means that sensitive customer data, including PII and 2FA recovery codes, can be stolen, potentially leading to identity theft, fraud, and unauthorized access to user accounts. Ecommerce businesses relying on Craft Commerce may suffer reputational damage, regulatory penalties under GDPR for inadequate data protection, and operational disruption. The fact that database backup permissions do not require elevated privileges increases the risk that internal users or attackers who gain limited access can exploit this vulnerability. This could lead to widespread data leakage across multiple clients or customers. Additionally, the stored XSS could be used to pivot attacks within the organization’s network or to deliver further malware payloads. The medium CVSS score reflects the need for some privileges and user interaction, but the high impact on confidentiality and potential regulatory consequences make this a critical concern for data-sensitive ecommerce operations in Europe.
Mitigation Recommendations
1. Immediately upgrade Craft Commerce installations to versions 4.10.1 or 5.5.2 or later, where the vulnerability is patched. 2. Audit and restrict database backup utility permissions to only trusted administrators; avoid granting these permissions broadly or to non-administrative users. 3. Implement strict input validation and output encoding on all user-supplied content, especially in order status messages, to prevent injection of raw HTML or scripts. 4. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in the web application context. 5. Monitor logs for unusual activity related to order status messages or database backup operations to detect potential exploitation attempts. 6. Conduct regular security reviews and penetration testing focusing on web application input handling and privilege management. 7. Educate staff about the risks of granting excessive permissions and the importance of applying security patches promptly. 8. Consider isolating the database backup functionality behind additional authentication or network segmentation to reduce exposure.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-02T16:31:35.821Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69823eb3f9fa50a62fd8ce74
Added to database: 2/3/2026, 6:30:11 PM
Last enriched: 2/3/2026, 6:47:01 PM
Last updated: 2/7/2026, 3:58:29 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2090: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2089: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2088: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumCVE-2026-2087: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2086: Buffer Overflow in UTT HiPER 810G
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.