CE Phoenix is a free, open-source eCommerce platform. A stored cross-site scripting (XSS) vulnerability was discovered in CE Phoenix versions 1.0.9.9 through 1.1.0.2 where an attacker can inject malicious JavaScript into the testimonial description field. Once submitted, if the shop owner (admin) approves the testimonial, the script executes in the context of any user visiting the testimonial page. Because the session cookies are not marked with the `HttpOnly` flag, they can be exfiltrated by the attacker — potentially leading to account takeover. Version 1.1.0.3 fixes the issue.
References
Link | Resource |
---|---|
https://drive.google.com/file/d/1uQAEjewSL9jWWu1UHe47tAnM7U4_x39g/view?usp=drive_link | Permissions Required |
https://github.com/CE-PhoenixCart/PhoenixCart/security/advisories/GHSA-98qq-m8qj-vvgj | Vendor Advisory |
https://github.com/CE-PhoenixCart/PhoenixCart/security/advisories/GHSA-98qq-m8qj-vvgj | Vendor Advisory |
Configurations
History
08 Jul 2025, 17:09
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-02 11:15
Updated : 2025-07-08 17:09
NVD link : CVE-2025-47289
Mitre link : CVE-2025-47289
CVE.ORG link : CVE-2025-47289
JSON object : View
Products Affected
phoenixcart
- ce_phoenix_cart