Moderate severityNVD Advisory· Published Feb 3, 2011· Updated Apr 29, 2026
CVE-2011-0451
CVE-2011-0451
Description
Multiple cross-site scripting (XSS) vulnerabilities in (1) data/Smarty/templates/default/list.tpl and (2) data/Smarty/templates/default/campaign/bloc/cart_tag.tpl in EC-CUBE before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
ec-cube/ec-cubePackagist | < 2.4.4 | 2.4.4 |
Affected products
42cpe:2.3:a:lockon:ec-cube:*:*:*:*:*:*:*:*+ 41 more
- cpe:2.3:a:lockon:ec-cube:*:*:*:*:*:*:*:*range: <=2.4.3
- cpe:2.3:a:lockon:ec-cube:1.1.0:beta:*:*:*:*:*:*
- cpe:2.3:a:lockon:ec-cube:1.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:lockon:ec-cube:1.2.0:beta:*:*:*:*:*:*
- cpe:2.3:a:lockon:ec-cube:1.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:lockon:ec-cube:1.3.0:beta:*:*:*:*:*:*
- cpe:2.3:a:lockon:ec-cube:1.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:lockon:ec-cube:1.3.1:a:*:*:*:*:*:*
- cpe:2.3:a:lockon:ec-cube:1.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:lockon:ec-cube:1.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:lockon:ec-cube:1.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:lockon:ec-cube:1.3.4:community:*:*:*:*:*:*
- cpe:2.3:a:lockon:ec-cube:1.4.0:a-beta:*:*:*:*:*:*
- cpe:2.3:a:lockon:ec-cube:1.4.0:beta:*:*:*:*:*:*
- cpe:2.3:a:lockon:ec-cube:1.4.1:beta:*:*:*:*:*:*
- cpe:2.3:a:lockon:ec-cube:1.4.2:beta:*:*:*:*:*:*
- cpe:2.3:a:lockon:ec-cube:1.4.3:a-beta:*:*:*:*:*:*
- cpe:2.3:a:lockon:ec-cube:1.4.3:b-beta:*:*:*:*:*:*
- cpe:2.3:a:lockon:ec-cube:1.4.3:beta:*:*:*:*:*:*
- cpe:2.3:a:lockon:ec-cube:1.4.5:*:*:*:*:*:*:*
- cpe:2.3:a:lockon:ec-cube:1.4.6:*:*:*:*:*:*:*
- cpe:2.3:a:lockon:ec-cube:1.4.7:*:*:*:*:*:*:*
- cpe:2.3:a:lockon:ec-cube:1.5.0:beta:*:*:*:*:*:*
- cpe:2.3:a:lockon:ec-cube:2.0.0:beta:*:*:*:*:*:*
- cpe:2.3:a:lockon:ec-cube:2.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:lockon:ec-cube:2.0.1:a:*:*:*:*:*:*
- cpe:2.3:a:lockon:ec-cube:2.1.0:beta:*:*:*:*:*:*
- cpe:2.3:a:lockon:ec-cube:2.11.0:beta:*:*:*:*:*:*
- cpe:2.3:a:lockon:ec-cube:2.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:lockon:ec-cube:2.1.2:a:*:*:*:*:*:*
- cpe:2.3:a:lockon:ec-cube:2.2.0:beta:*:*:*:*:*:*
- cpe:2.3:a:lockon:ec-cube:2.2.1:one:*:*:*:*:*:*
- cpe:2.3:a:lockon:ec-cube:2.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:lockon:ec-cube:2.3.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:lockon:ec-cube:2.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:lockon:ec-cube:2.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:lockon:ec-cube:2.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:lockon:ec-cube:2.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:lockon:ec-cube:2.4.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:lockon:ec-cube:2.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:lockon:ec-cube:2.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:lockon:ec-cube:2.4.4:*:*:*:*:*:*:*
Patches
12 files changed · +2 −2
data/Smarty/templates/default/campaign/bloc/cart_tag.tpl+1 −1 modified@@ -61,7 +61,7 @@ </dd> </dl> <div class="cartbtn"> - <a href="<!--{$smarty.server.REQUEST_URI|escape}-->#product<!--{$id}-->" onclick="fnChangeAction('<!--{$smarty.server.REQUEST_URI|escape}-->#product<!--{$id}-->'); fnModeSubmit('cart','product_id','<!--{$id}-->'); return false;" onmouseover="chgImg('<!--{$TPL_DIR}-->img/products/b_cartin_on.gif','cart<!--{$id}-->');" onmouseout="chgImg('<!--{$TPL_DIR}-->img/products/b_cartin.gif','cart<!--{$id}-->');"> + <a href="<!--{$smarty.server.REQUEST_URI|escape}-->#product<!--{$id}-->" onclick="fnChangeAction('<!--{$smarty.server.REQUEST_URI|escape:"javascript"}-->#product<!--{$id}-->'); fnModeSubmit('cart','product_id','<!--{$id}-->'); return false;" onmouseover="chgImg('<!--{$TPL_DIR}-->img/products/b_cartin_on.gif','cart<!--{$id}-->');" onmouseout="chgImg('<!--{$TPL_DIR}-->img/products/b_cartin.gif','cart<!--{$id}-->');"> <img src="<!--{$TPL_DIR}-->img/products/b_cartin.gif" width="115" height="25" alt="カゴに入れる" name="cart<!--{$id}-->" id="cart<!--{$id}-->" /></a> </div> </div>
data/Smarty/templates/default/list.tpl+1 −1 modified@@ -173,7 +173,7 @@ function lnSetSelect(name1, name2, id, val) { </dd> </dl> <div class="cartbtn"> - <a href="<!--{$smarty.server.REQUEST_URI|escape}-->#product<!--{$id}-->" onclick="fnChangeAction('<!--{$smarty.server.REQUEST_URI|escape}-->#product<!--{$id}-->'); fnModeSubmit('cart','product_id','<!--{$id}-->'); return false;" onmouseover="chgImg('<!--{$TPL_DIR}-->img/products/b_cartin_on.gif','cart<!--{$id}-->');" onmouseout="chgImg('<!--{$TPL_DIR}-->img/products/b_cartin.gif','cart<!--{$id}-->');"> + <a href="<!--{$smarty.server.REQUEST_URI|escape}-->#product<!--{$id}-->" onclick="fnChangeAction('<!--{$smarty.server.REQUEST_URI|escape:"javascript"}-->#product<!--{$id}-->'); fnModeSubmit('cart','product_id','<!--{$id}-->'); return false;" onmouseover="chgImg('<!--{$TPL_DIR}-->img/products/b_cartin_on.gif','cart<!--{$id}-->');" onmouseout="chgImg('<!--{$TPL_DIR}-->img/products/b_cartin.gif','cart<!--{$id}-->');"> <img src="<!--{$TPL_DIR}-->img/products/b_cartin.gif" width="115" height="25" alt="カゴに入れる" name="cart<!--{$id}-->" id="cart<!--{$id}-->" /></a> </div> </div>
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
11- svn.ec-cube.net/open_trac/changeset/18742nvdPatchWEB
- secunia.com/advisories/43153nvdVendor Advisory
- github.com/advisories/GHSA-wgvv-5396-ggvjghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2011-0451ghsaADVISORY
- jvn.jp/en/jp/JVN84393059/index.htmlnvdWEB
- jvndb.jvn.jp/en/contents/2011/JVNDB-2011-000011.htmlnvdWEB
- www.ec-cube.net/info/weakness/weakness.phpnvdWEB
- exchange.xforce.ibmcloud.com/vulnerabilities/65079nvdWEB
- github.com/EC-CUBE/ec-cube/commit/8ef6541fc66b86d40a4333ec1608be3191c5e463ghsaWEB
- web.archive.org/web/20200229005109/http://www.securityfocus.com/bid/46100ghsaWEB
- www.securityfocus.com/bid/46100nvd
News mentions
0No linked articles in our index yet.