Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25483: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in craftcms commerce

0
Medium
VulnerabilityCVE-2026-25483cvecve-2026-25483cwe-79
Published: Tue Feb 03 2026 (02/03/2026, 18:05:49 UTC)
Source: CVE Database V5
Vendor/Project: craftcms
Product: commerce

Description

Craft Commerce is an ecommerce platform for Craft CMS. In versions from 4.0.0-RC1 to 4.10.0 and from 5.0.0 to 5.5.1, a stored XSS vulnerability exists in Craft Commerce’s Order Status History Message. The message is rendered using the |md filter, which permits raw HTML, enabling malicious script execution. If a user has database backup utility permissions (which do not require an elevated session), an attacker can exfiltrate the entire database, including all user credentials, customer PII, order history, and 2FA recovery codes. This issue has been patched in versions 4.10.1 and 5.5.2.

AI-Powered Analysis

AILast updated: 02/03/2026, 18:47:01 UTC

Technical Analysis

CVE-2026-25483 is a stored cross-site scripting (XSS) vulnerability identified in Craft Commerce, an ecommerce platform built on Craft CMS. The vulnerability affects versions from 4.0.0-RC1 up to 4.10.0 and from 5.0.0 up to 5.5.1. The root cause lies in the Order Status History Message feature, which uses the |md filter to render messages. This filter permits raw HTML content, which allows an attacker to inject malicious scripts that execute in the context of users viewing the order status history. The exploitation scenario requires the attacker to have database backup utility permissions, which notably do not require an elevated session or administrative privileges, lowering the barrier to exploitation. By leveraging this XSS, an attacker can execute scripts that exfiltrate sensitive data, including the entire database containing user credentials, customer personally identifiable information (PII), order histories, and two-factor authentication (2FA) recovery codes. This level of access can lead to full account compromise and data breaches. The vulnerability has been addressed and patched in Craft Commerce versions 4.10.1 and 5.5.2. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no authentication required (AT:N), but some privileges needed (PR:L), and user interaction required (UI:P). The scope is limited (SI:L), with no impact on confidentiality, integrity, or availability metrics directly (VC:N/VI:N/VA:N), but the overall impact is significant due to data exposure. No known exploits have been reported in the wild as of the publication date. The vulnerability is classified under CWE-79, which covers improper neutralization of input during web page generation leading to XSS.

Potential Impact

For European organizations using affected versions of Craft Commerce, this vulnerability poses a significant risk of data breach and account compromise. The ability to exfiltrate the entire database means that sensitive customer data, including PII and 2FA recovery codes, can be stolen, potentially leading to identity theft, fraud, and unauthorized access to user accounts. Ecommerce businesses relying on Craft Commerce may suffer reputational damage, regulatory penalties under GDPR for inadequate data protection, and operational disruption. The fact that database backup permissions do not require elevated privileges increases the risk that internal users or attackers who gain limited access can exploit this vulnerability. This could lead to widespread data leakage across multiple clients or customers. Additionally, the stored XSS could be used to pivot attacks within the organization’s network or to deliver further malware payloads. The medium CVSS score reflects the need for some privileges and user interaction, but the high impact on confidentiality and potential regulatory consequences make this a critical concern for data-sensitive ecommerce operations in Europe.

Mitigation Recommendations

1. Immediately upgrade Craft Commerce installations to versions 4.10.1 or 5.5.2 or later, where the vulnerability is patched. 2. Audit and restrict database backup utility permissions to only trusted administrators; avoid granting these permissions broadly or to non-administrative users. 3. Implement strict input validation and output encoding on all user-supplied content, especially in order status messages, to prevent injection of raw HTML or scripts. 4. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in the web application context. 5. Monitor logs for unusual activity related to order status messages or database backup operations to detect potential exploitation attempts. 6. Conduct regular security reviews and penetration testing focusing on web application input handling and privilege management. 7. Educate staff about the risks of granting excessive permissions and the importance of applying security patches promptly. 8. Consider isolating the database backup functionality behind additional authentication or network segmentation to reduce exposure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-02T16:31:35.821Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69823eb3f9fa50a62fd8ce74

Added to database: 2/3/2026, 6:30:11 PM

Last enriched: 2/3/2026, 6:47:01 PM

Last updated: 2/7/2026, 3:58:29 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats