Dismissed
by @LeSuisse Activity log
- Created automatic suggestion
-
@LeSuisse
removed
8 packages
- python312Packages.azure-mgmt-commerce
- python313Packages.azure-mgmt-commerce
- python312Packages.mypy-boto3-marketplacecommerceanalytics
- python314Packages.azure-mgmt-commerce
- python313Packages.mypy-boto3-marketplacecommerceanalytics
- python314Packages.mypy-boto3-marketplacecommerceanalytics
- python312Packages.types-aiobotocore-marketplacecommerceanalytics
- python313Packages.types-aiobotocore-marketplacecommerceanalytics
- @LeSuisse dismissed
Craft Commerce has Stored XSS via Order Status Message with potential database exfiltration
Craft Commerce is an ecommerce platform for Craft CMS. In versions from 4.0.0-RC1 to 4.10.0 and from 5.0.0 to 5.5.1, a stored XSS vulnerability exists in Craft Commerce’s Order Status History Message. The message is rendered using the |md filter, which permits raw HTML, enabling malicious script execution. If a user has database backup utility permissions (which do not require an elevated session), an attacker can exfiltrate the entire database, including all user credentials, customer PII, order history, and 2FA recovery codes. This issue has been patched in versions 4.10.1 and 5.5.2.
References
- https://github.com/craftcms/commerce/security/advisories/GHSA-8478-rmjg-mjj5 x_refsource_CONFIRM
- https://github.com/craftcms/commerce/commit/4665a47c0961aee311a42af2ff94a7c470f0ad8c x_refsource_MISC
- https://github.com/craftcms/commerce/releases/tag/4.10.1 x_refsource_MISC
- https://github.com/craftcms/commerce/releases/tag/5.5.2 x_refsource_MISC
- https://github.com/craftcms/commerce/security/advisories/GHSA-8478-rmjg-mjj5 x_refsource_CONFIRM
- https://github.com/craftcms/commerce/commit/4665a47c0961aee311a42af2ff94a7c470f0ad8c x_refsource_MISC
- https://github.com/craftcms/commerce/releases/tag/4.10.1 x_refsource_MISC
- https://github.com/craftcms/commerce/releases/tag/5.5.2 x_refsource_MISC
Affected products
commerce
- ==>= 5.0.0, < 5.5.2
- ==>= 4.0.0-RC1, < 4.10.1