CVE-2026-25483

5.4 MEDIUM
Published: February 03, 2026 Modified: February 10, 2026
View on NVD

Description

Craft Commerce is an ecommerce platform for Craft CMS. In versions from 4.0.0-RC1 to 4.10.0 and from 5.0.0 to 5.5.1, a stored XSS vulnerability exists in Craft Commerce’s Order Status History Message. The message is rendered using the |md filter, which permits raw HTML, enabling malicious script execution. If a user has database backup utility permissions (which do not require an elevated session), an attacker can exfiltrate the entire database, including all user credentials, customer PII, order history, and 2FA recovery codes. This issue has been patched in versions 4.10.1 and 5.5.2.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://github.com/craftcms/commerce/releases/tag/4.10.1
Source: security-advisories@github.com
Release Notes
https://github.com/craftcms/commerce/releases/tag/5.5.2
Source: security-advisories@github.com
Release Notes
https://github.com/craftcms/commerce/security/advisories/GHSA-8478-rmjg-mjj5
Source: security-advisories@github.com
Exploit Vendor Advisory Patch

4 reference(s) from NVD

Quick Stats

CVSS v3 Score
5.4 / 10.0
EPSS (Exploit Probability)
0.0%
2th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

craftcms