CVE-2023-54364
Description
Joomla HikaShop 4.7.4 contains a reflected cross-site scripting vulnerability that allows unauthenticated attackers to inject malicious scripts by manipulating GET parameters in the product filter endpoint. Attackers can craft malicious URLs containing XSS payloads in the from_option, from_ctrl, from_task, or from_itemid parameters to steal session tokens or login credentials when victims visit the link.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Joomla HikaShop 4.7.4 is vulnerable to reflected XSS via GET parameters in the product filter, allowing unauthenticated attackers to steal session tokens.
Vulnerability
Overview
CVE-2023-54364 describes a reflected cross-site scripting (XSS) vulnerability in Joomla HikaShop version 4.7.4. The root cause is insufficient sanitization of user-supplied input passed to the from_option, from_ctrl, from_task, and from_itemid GET parameters within the product filter endpoint (/index.php?option=com_hikashop&ctrl=product&task=filter). This allows an attacker to inject arbitrary JavaScript code that is reflected back to the victim's browser without proper encoding or validation [2][4].
Exploitation
Details
The vulnerability can be exploited by an unauthenticated attacker who crafts a malicious URL containing an XSS payload in one of the vulnerable parameters. The attacker then delivers this URL to a victim via email, instant message, or other means. When the victim clicks the link, the injected script executes in the context of the vulnerable site. Proof-of-concept URLs have been published, demonstrating payloads that trigger on mouseover events or other user interactions [2]. No authentication or special privileges are required to trigger the reflection.
Impact
Successful exploitation allows the attacker to perform a wide range of malicious actions, including stealing the victim's session tokens or login credentials, defacing the page, or redirecting the user to a phishing site. Because the script runs in the security context of the Joomla site, it can access cookies, local storage, and perform actions on behalf of the authenticated user if the victim is logged in [2][4].
Mitigation
Status
As of the publication date, no official patch has been confirmed for this vulnerability. Users are advised to apply input validation and output encoding on the affected parameters, or to upgrade to a newer version of HikaShop if a security update becomes available. The vendor's website does not mention a fix, and the exploit has been publicly disclosed [2][4].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.