VYPR
Medium severity6.1NVD Advisory· Published May 5, 2026· Updated May 5, 2026

CVE-2023-54349

CVE-2023-54349

Description

AmazCart CMS 3.4 contains a reflected cross-site scripting vulnerability that allows unauthenticated attackers to inject malicious scripts by submitting payloads through the search functionality. Attackers can enter script tags in the search box to execute arbitrary JavaScript that fires when search history is viewed or results are displayed.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

AmazCart CMS 3.4 suffers from a reflected XSS vulnerability where unauthenticated attackers can inject arbitrary JavaScript via the search box, which executes when search history is viewed.

Vulnerability

Overview AmazCart CMS 3.4, a Laravel-based e-commerce system, includes a reflected cross-site scripting (XSS) flaw in its search functionality. The application fails to properly sanitize user-supplied input in the search functionality, allowing attackers to inject arbitrary script payloads such as ">. [1][2]

Attack

Vector and Exploitation The vulnerability can be exploited by unauthenticated attackers with network access to the application. An attacker simply submits a crafted search query containing JavaScript code. The payload is immediately reflected in the search results page, and it also persists in the user's search history, firing every time the history is viewed. [1]

Impact

Successful exploitation enables an attacker to execute arbitrary JavaScript in the victim's browser context occurs. This allows the attacker to perform actions such as stealing session cookies, redirecting users to malicious sites, or defacing the page. The CVSS v4 CVSS score is 6.1, reflecting the requirement for user interaction (e.g., viewing search history) and the resulting limited impact on confidentiality and integrity. [2]

Mitigation

Status As of the published date, no patch has been announced. Users are advised to apply input sanitization to the search field and consider implementing a Web Application Firewall (WAF). The vendor, CodeThemes, has not provided an official update for this CVE. [1][2]

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.