VYPR
Medium severity6.4NVD Advisory· Published Jan 30, 2026· Updated Apr 15, 2026

CVE-2020-37003

CVE-2020-37003

Description

Sellacious eCommerce 4.6 contains a persistent cross-site scripting vulnerability in the Manage Your Addresses module that allows attackers to inject malicious scripts. Attackers can exploit multiple address input fields like full name, company, and address to execute persistent script code that can hijack user sessions and manipulate application modules.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Sellacious eCommerce 4.6 has a persistent XSS in the Manage Your Addresses module, allowing attackers to inject scripts via address fields to hijack sessions and manipulate modules.

Vulnerability

Overview

Sellacious eCommerce 4.6 contains a persistent cross-site scripting (XSS) vulnerability in the Manage Your Addresses module [1][2]. The root cause is insufficient input validation on multiple address fields, including full name, first name, middle name, last name, company, and address [1][2]. This allows attackers to inject arbitrary JavaScript code that is stored on the server and executed whenever the address information is rendered in the application's user interface [1][2].

Exploitation

An attacker can exploit this vulnerability by first registering a low-privilege user account (guest privileges) [1][2]. Using the POST request method, the attacker injects malicious script code into any of the vulnerable address input fields [2]. The injected script is then persistently stored and executed each time the address is displayed, affecting all users who view the compromised address [1][2].

Impact

Successful exploitation enables an attacker to hijack active user sessions, conduct persistent phishing attacks, redirect users to malicious external sites, and manipulate affected application modules [1][2][4]. The attack does not require high privileges, making it accessible to any registered user [1].

Mitigation

The vulnerability was publicly disclosed in May 2020 [1][2]. No official patch has been confirmed; users are advised to implement strict input validation and output encoding to prevent script injection [1][2][4].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.