Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-2jc6-3fhj-8q84: OroCommerce Cross-site Scripting vulnerability in add note dialog of Shopping List line item

Impact

The JS payload added to the product name may be executed at the storefront when adding a note to the shopping list line item containing a vulnerable product. An attacker should be able to edit a product in the admin area and force a user to add this product to Shopping List and click add a note for it.

ghsa
#xss#vulnerability#js#git
  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. CVE-2022-35950

OroCommerce Cross-site Scripting vulnerability in add note dialog of Shopping List line item

Moderate severity GitHub Reviewed Published Oct 9, 2023 in oroinc/orocommerce • Updated Oct 10, 2023

Package

Affected versions

>= 4.1.0, <= 4.1.13

>= 4.2.0, <= 4.2.10

>= 5.0.0, < 5.0.11

>= 5.1.0, < 5.1.1

Patched versions

5.0.11

5.1.1

Impact

The JS payload added to the product name may be executed at the storefront when adding a note to the shopping list line item containing a vulnerable product.
An attacker should be able to edit a product in the admin area and force a user to add this product to Shopping List and click add a note for it.

References

  • GHSA-2jc6-3fhj-8q84
  • https://nvd.nist.gov/vuln/detail/CVE-2022-35950

Published to the GitHub Advisory Database

Oct 10, 2023

Last updated

Oct 10, 2023

Related news

CVE-2022-35950: XSS vulnerability in add note dialog of Shopping List line item

OroCommerce is an open-source Business to Business Commerce application. In versions 4.1.0 through 4.1.13, 4.2.0 through 4.2.10, 5.0.0 prior to 5.0.11, and 5.1.0 prior to 5.1.1, the JS payload added to the product name may be executed at the storefront when adding a note to the shopping list line item containing a vulnerable product. An attacker should be able to edit a product in the admin area and force a user to add this product to Shopping List and click add a note for it. Versions 5.0.11 and 5.1.1 contain a fix for this issue.