VYPR
Unrated severityNVD Advisory· Published Oct 16, 2014· Updated May 6, 2026

CVE-2014-8307

CVE-2014-8307

Description

Multiple cross-site scripting (XSS) vulnerabilities in skins/default/outline.tpl in C97net Cart Engine before 4.0 allow remote attackers to inject arbitrary web script or HTML via the (1) path parameter in the "drop down TOP menu (with path)" section or (2) print_this_page variable in the footer_content_block section, as demonstrated by the QUERY_STRING to (a) index.php, (b) checkout.php, (c) contact.php, (d) detail.php, (e) distro.php, (f) newsletter.php, (g) page.php, (h) profile.php, (i) search.php, (j) sitemap.php, (k) task.php, or (l) tell.php.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Cart Engine before 4.0 has multiple XSS vulnerabilities in outline.tpl via path and print_this_page parameters.

Vulnerability

Cart Engine before version 4.0 contains multiple reflected cross-site scripting (XSS) vulnerabilities in the skins/default/outline.tpl template file. User input from the path parameter (used in the "drop down TOP menu (with path)" section) and the print_this_page variable (used in the footer_content_block section) is not properly sanitized before being included in the page output. This allows attackers to inject arbitrary HTML or JavaScript. The vulnerability affects multiple pages including index.php, checkout.php, contact.php, detail.php, distro.php, newsletter.php, page.php, profile.php, search.php, sitemap.php, task.php, and tell.php [1].

Exploitation

An attacker can exploit this vulnerability by crafting a malicious URL containing the injected script in the QUERY_STRING parameter. The attacker must convince a victim to click on the crafted link. No prior authentication is required, and the vulnerability is triggered when the victim's browser loads the page [1].

Impact

Successful exploitation allows an attacker to execute arbitrary HTML and JavaScript code in the victim's browser within the context of the affected website. This can lead to session hijacking, credential theft, defacement, or redirection to malicious sites [1].

Mitigation

The vulnerability is fixed in Cart Engine version 4.0. Users are advised to upgrade to the latest version. If upgrading is not immediately possible, input validation and output encoding should be applied to the path and print_this_page parameters [1].

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.