VYPR
Medium severity6.4NVD Advisory· Published Feb 1, 2026· Updated Apr 15, 2026

CVE-2022-50941

CVE-2022-50941

Description

BootCommerce 3.2.1 contains persistent input validation vulnerabilities that allow remote attackers to inject malicious script code through guest order checkout input fields. Attackers can exploit unvalidated input parameters to execute arbitrary scripts, potentially leading to session hijacking, phishing attacks, and application module manipulation.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

BootCommerce 3.2.1 fails to sanitize guest checkout fields, enabling persistent XSS that can lead to session hijacking and phishing.

Vulnerability

Overview BootCommerce 3.2.1 contains persistent input validation vulnerabilities in the guest order checkout process. The application does not properly validate or sanitize user-supplied input in checkout fields, allowing remote attackers to inject arbitrary JavaScript or HTML code. This flaw is classified as a persistent (stored) cross-site scripting (XSS) vulnerability [1][2].

Exploitation

Prerequisites An attacker can exploit this vulnerability without requiring prior authentication, as the checkout process is accessible to guest users. The attack vector is remote, and only low user interaction is needed—for example, a victim administrator or other user viewing the affected order records. The injected script is stored on the server and executed when the stored data is rendered in a browser [1].

Impact

Successful exploitation enables an attacker to execute arbitrary script code in the context of the victim's session. This can lead to session hijacking, phishing attacks, and manipulation of application modules. The CVSS v3 score is 6.4 (Medium), reflecting the potential for significant confidentiality and integrity impact without requiring high privileges [2].

Mitigation

The vendor was notified in August 2021, and a fix was reportedly developed. Users should upgrade to a patched version of BootCommerce. No workaround is documented; applying the vendor's patch is recommended [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.