CVE-2026-29177: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in craftcms commerce
CVE-2026-29177 is a stored Cross-Site Scripting (XSS) vulnerability in Craft Commerce versions prior to 4. 10. 2 and 5. 5. 3. The flaw allows malicious JavaScript injection via user-controllable fields such as Shipping Method Name, Order Reference, or Site Name. The payload executes when a user views the order details slideout by double-clicking an order on the index page. Exploitation requires low privileges and user interaction but does not require authentication. The vulnerability has a low CVSS score of 1. 9 and no known exploits in the wild.
AI Analysis
Technical Summary
CVE-2026-29177 is a stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79 affecting Craft Commerce, an ecommerce platform integrated with Craft CMS. The vulnerability exists in versions >=4.0.0 and <4.10.2, and >=5.0.0 and <5.5.3. It arises from improper neutralization of input during web page generation, specifically in the order details interface. Attackers can inject malicious JavaScript code through input fields such as Shipping Method Name, Order Reference, or Site Name. When a user double-clicks an order on the order index page to open the order details slideout, the injected script executes in the context of the victim’s browser. This can lead to session hijacking, defacement, or other client-side attacks. The vulnerability requires low privileges (PR:L), user interaction (UI:A), and no authentication (AT:N). The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), and limited impact on confidentiality and integrity (VI:L), with no impact on availability or system components. No known exploits have been reported in the wild. The issue was addressed in Craft Commerce versions 4.10.2 and 5.5.3 by properly sanitizing and encoding user input before rendering it in the order details UI.
Potential Impact
The primary impact of this vulnerability is the potential execution of arbitrary JavaScript in the browsers of users viewing order details, which could lead to session hijacking, theft of sensitive information, or unauthorized actions performed on behalf of the user. Although the CVSS score is low, the risk increases in environments where users with elevated privileges (e.g., administrators or customer service agents) access order details, as their sessions could be compromised. This could lead to further compromise of the ecommerce platform or customer data. The vulnerability could also be leveraged for phishing or social engineering attacks by injecting misleading content. However, exploitation requires user interaction and some level of privilege, limiting the scope of impact. Organizations running affected versions of Craft Commerce risk reputational damage and potential data breaches if the vulnerability is exploited.
Mitigation Recommendations
Organizations should immediately upgrade Craft Commerce to versions 4.10.2 or 5.5.3 or later, where the vulnerability is patched. Until upgrades are applied, administrators should restrict access to the order details interface to trusted users only and monitor for suspicious activity. Implementing Content Security Policy (CSP) headers can help mitigate the impact of injected scripts by restricting script execution sources. Input validation and output encoding should be reviewed and enhanced in custom plugins or integrations interacting with order data. Regular security audits and penetration testing focused on user input handling in ecommerce workflows are recommended. Additionally, educating users about the risks of interacting with untrusted content and monitoring logs for unusual order detail access patterns can reduce exploitation likelihood.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, Netherlands, France, Japan, Sweden, Switzerland
CVE-2026-29177: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in craftcms commerce
Description
CVE-2026-29177 is a stored Cross-Site Scripting (XSS) vulnerability in Craft Commerce versions prior to 4. 10. 2 and 5. 5. 3. The flaw allows malicious JavaScript injection via user-controllable fields such as Shipping Method Name, Order Reference, or Site Name. The payload executes when a user views the order details slideout by double-clicking an order on the index page. Exploitation requires low privileges and user interaction but does not require authentication. The vulnerability has a low CVSS score of 1. 9 and no known exploits in the wild.
AI-Powered Analysis
Technical Analysis
CVE-2026-29177 is a stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79 affecting Craft Commerce, an ecommerce platform integrated with Craft CMS. The vulnerability exists in versions >=4.0.0 and <4.10.2, and >=5.0.0 and <5.5.3. It arises from improper neutralization of input during web page generation, specifically in the order details interface. Attackers can inject malicious JavaScript code through input fields such as Shipping Method Name, Order Reference, or Site Name. When a user double-clicks an order on the order index page to open the order details slideout, the injected script executes in the context of the victim’s browser. This can lead to session hijacking, defacement, or other client-side attacks. The vulnerability requires low privileges (PR:L), user interaction (UI:A), and no authentication (AT:N). The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), and limited impact on confidentiality and integrity (VI:L), with no impact on availability or system components. No known exploits have been reported in the wild. The issue was addressed in Craft Commerce versions 4.10.2 and 5.5.3 by properly sanitizing and encoding user input before rendering it in the order details UI.
Potential Impact
The primary impact of this vulnerability is the potential execution of arbitrary JavaScript in the browsers of users viewing order details, which could lead to session hijacking, theft of sensitive information, or unauthorized actions performed on behalf of the user. Although the CVSS score is low, the risk increases in environments where users with elevated privileges (e.g., administrators or customer service agents) access order details, as their sessions could be compromised. This could lead to further compromise of the ecommerce platform or customer data. The vulnerability could also be leveraged for phishing or social engineering attacks by injecting misleading content. However, exploitation requires user interaction and some level of privilege, limiting the scope of impact. Organizations running affected versions of Craft Commerce risk reputational damage and potential data breaches if the vulnerability is exploited.
Mitigation Recommendations
Organizations should immediately upgrade Craft Commerce to versions 4.10.2 or 5.5.3 or later, where the vulnerability is patched. Until upgrades are applied, administrators should restrict access to the order details interface to trusted users only and monitor for suspicious activity. Implementing Content Security Policy (CSP) headers can help mitigate the impact of injected scripts by restricting script execution sources. Input validation and output encoding should be reviewed and enhanced in custom plugins or integrations interacting with order data. Regular security audits and penetration testing focused on user input handling in ecommerce workflows are recommended. Additionally, educating users about the risks of interacting with untrusted content and monitoring logs for unusual order detail access patterns can reduce exploitation likelihood.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-04T14:44:00.713Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69b07bba2f860ef943b24cd7
Added to database: 3/10/2026, 8:14:50 PM
Last enriched: 3/10/2026, 8:30:11 PM
Last updated: 3/10/2026, 9:35:24 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.