Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25488: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in craftcms commerce

0
Medium
VulnerabilityCVE-2026-25488cvecve-2026-25488cwe-79
Published: Tue Feb 03 2026 (02/03/2026, 18:07:25 UTC)
Source: CVE Database V5
Vendor/Project: craftcms
Product: commerce

Description

CVE-2026-25488 is a stored Cross-Site Scripting (XSS) vulnerability in Craft Commerce versions 4. 0. 0-RC1 to 4. 10. 0 and 5. 0. 0 to 5. 5. 1. The flaw arises from improper sanitization of the Tax Categories (Name & Description) fields in the Store Management admin panel, allowing attackers to inject malicious JavaScript that executes in an administrator's browser.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/11/2026, 11:43:10 UTC

Technical Analysis

CVE-2026-25488 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Craft Commerce plugin for Craft CMS, affecting versions from 4.0.0-RC1 up to 4.10.0 and from 5.0.0 up to 5.5.1. The vulnerability stems from improper neutralization of input in the Tax Categories fields (Name and Description) within the Store Management section of the administrative interface. Specifically, these fields do not adequately sanitize user-supplied input before rendering it in the admin panel, enabling an attacker with access to create or modify tax categories to inject malicious JavaScript code. When an administrator views the affected page, the injected script executes in their browser context, potentially allowing session hijacking, privilege escalation, or other malicious actions within the admin interface. Exploitation requires the attacker to have at least high privileges (e.g., a user with rights to modify tax categories) and some user interaction (the admin must view the malicious content). The vulnerability does not require bypassing authentication or compromising confidentiality, integrity, or availability of the system directly but can lead to indirect compromise through administrative session hijacking or manipulation. The issue has been addressed in Craft Commerce versions 4.10.1 and 5.5.2 by implementing proper input sanitization and output encoding. No public exploits have been reported to date, but the medium CVSS score of 6.1 reflects the moderate risk due to the administrative context and stored nature of the XSS. Organizations running affected versions should upgrade promptly to mitigate risk.

Potential Impact

For European organizations, this vulnerability poses a significant risk primarily to ecommerce platforms using Craft Commerce integrated with Craft CMS. Successful exploitation can lead to administrative account compromise through session hijacking or execution of arbitrary scripts in the admin context, potentially allowing attackers to manipulate store configurations, access sensitive customer data, or disrupt ecommerce operations. Given the administrative scope, the impact on confidentiality and integrity is moderate but could escalate if attackers leverage the access to deploy further attacks or extract sensitive information. Availability impact is minimal unless attackers use the access to disrupt services. The threat is particularly relevant for organizations with complex ecommerce operations relying on Craft Commerce for tax management and store configuration. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often target ecommerce platforms. The medium severity rating suggests that while the vulnerability is not critical, it warrants timely remediation to prevent exploitation in environments where administrative access is valuable.

Mitigation Recommendations

European organizations should immediately upgrade Craft Commerce to versions 4.10.1 or 5.5.2 or later to apply the official patch addressing this XSS vulnerability. Until patching is possible, organizations should restrict administrative access to trusted personnel only and implement network-level controls such as IP whitelisting or VPN access for the admin panel to reduce exposure. Additionally, enabling Content Security Policy (CSP) headers can help mitigate the impact of injected scripts by restricting script execution sources. Regularly auditing and sanitizing user-generated content in tax categories and other input fields can reduce the risk of malicious input. Monitoring administrative logs for unusual activity or unexpected changes to tax categories can provide early detection of exploitation attempts. Finally, educating administrators about the risks of clicking on suspicious links or viewing untrusted content within the admin panel can reduce the likelihood of successful exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-02T16:31:35.823Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69823eb4f9fa50a62fd8cea9

Added to database: 2/3/2026, 6:30:12 PM

Last enriched: 2/11/2026, 11:43:10 AM

Last updated: 3/24/2026, 7:11:38 AM

Views: 47

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses