CE Phoenix is a free, open-source eCommerce platform. A stored cross-site scripting (XSS) vulnerability was discovered in CE Phoenix versions 1.0.9.9 through 1.1.0.2 where an attacker can inject malicious JavaScript into the testimonial description field. Once submitted, if the shop owner (admin) approves the testimonial, the script executes in the context of any user visiting the testimonial page. Because the session cookies are not marked with the `HttpOnly` flag, they can be exfiltrated by the attacker — potentially leading to account takeover. Version 1.1.0.3 fixes the issue.
References
Configurations
No configuration.
History
02 Jun 2025, 13:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/CE-PhoenixCart/PhoenixCart/security/advisories/GHSA-98qq-m8qj-vvgj - |
02 Jun 2025, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-02 11:15
Updated : 2025-06-02 17:32
NVD link : CVE-2025-47289
Mitre link : CVE-2025-47289
CVE.ORG link : CVE-2025-47289
JSON object : View
Products Affected
No product.
CWE
CWE-1004
Sensitive Cookie Without 'HttpOnly' Flag