CVE-2023-46495
Description
Cross Site Scripting vulnerability in EverShop NPM versions before v.1.0.0-rc.8 allows a remote attacker to obtain sensitive information via a crafted request to the sortBy parameter.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A reflected XSS vulnerability in EverShop before v1.0.0-rc.8 allows attackers to execute arbitrary JavaScript via a crafted sortBy parameter.
Vulnerability
Overview
CVE-2023-46495 describes a reflected Cross-Site Scripting (XSS) vulnerability in the EverShop eCommerce platform, affecting all versions prior to v1.0.0-rc.8. The bug resides in the improper sanitization of the sortBy parameter. When an attacker supplies a second sortBy parameter in an HTTP request, the application reflects the value of the second parameter directly into the page's HTML without proper encoding or validation [1][3]. This fails to neutralize user input, allowing the injection of arbitrary JavaScript code.
Exploitation
Prerequisites
An attacker can exploit this vulnerability by crafting a URL containing a malicious sortBy parameter (e.g., ?sortBy=productId&sortBy=). The attack does not require authentication, as the vulnerability is triggered merely by a victim visiting the crafted link. No special network position is needed — the attack can be delivered via email, social media, or other channels [3].
Impact
Successful exploitation results in arbitrary JavaScript execution in the context of the victim's browser session on the EverShop application. This can lead to account takeover, session hijacking, exfiltration of sensitive data (such as customer information or credentials), and defacement. Because XSS allows the attacker to impersonate the user, the impact is considered high, especially on eCommerce sites handling personal and payment data [1][3].
Mitigation
The vulnerability has been fixed in EverShop version 1.0.0-rc.8. The fix was implemented in pull request #338 on the official GitHub repository, which introduced proper input sanitization and output encoding for the sortBy parameter [4]. Users are strongly advised to upgrade to the latest patched version immediately. No workarounds are documented; upgrading is the only complete mitigation [2][4].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
@evershop/evershopnpm | < 1.0.0-rc.8 | 1.0.0-rc.8 |
Affected products
2- EverShop/EverShop NPMdescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- github.com/advisories/GHSA-2xcj-557c-hf8rghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2023-46495ghsaADVISORY
- devhub.checkmarx.com/cve-details/CVE-2023-46495ghsaWEB
- devhub.checkmarx.com/cve-details/Cxbc6d4599-c1bdghsaWEB
- github.com/evershopcommerce/evershop/pull/338ghsaWEB
- devhub.checkmarx.com/cve-details/CVE-2023-46495/mitre
- devhub.checkmarx.com/cve-details/Cxbc6d4599-c1bd/mitre
News mentions
0No linked articles in our index yet.