VYPR
Medium severity6.1NVD Advisory· Published Apr 9, 2026· Updated Apr 15, 2026

CVE-2023-54364

CVE-2023-54364

Description

Joomla HikaShop 4.7.4 contains a reflected cross-site scripting vulnerability that allows unauthenticated attackers to inject malicious scripts by manipulating GET parameters in the product filter endpoint. Attackers can craft malicious URLs containing XSS payloads in the from_option, from_ctrl, from_task, or from_itemid parameters to steal session tokens or login credentials when victims visit the link.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Joomla HikaShop 4.7.4 is vulnerable to reflected XSS via GET parameters in the product filter, allowing unauthenticated attackers to steal session tokens.

Vulnerability

Overview

CVE-2023-54364 describes a reflected cross-site scripting (XSS) vulnerability in Joomla HikaShop version 4.7.4. The root cause is insufficient sanitization of user-supplied input passed to the from_option, from_ctrl, from_task, and from_itemid GET parameters within the product filter endpoint (/index.php?option=com_hikashop&ctrl=product&task=filter). This allows an attacker to inject arbitrary JavaScript code that is reflected back to the victim's browser without proper encoding or validation [2][4].

Exploitation

Details

The vulnerability can be exploited by an unauthenticated attacker who crafts a malicious URL containing an XSS payload in one of the vulnerable parameters. The attacker then delivers this URL to a victim via email, instant message, or other means. When the victim clicks the link, the injected script executes in the context of the vulnerable site. Proof-of-concept URLs have been published, demonstrating payloads that trigger on mouseover events or other user interactions [2]. No authentication or special privileges are required to trigger the reflection.

Impact

Successful exploitation allows the attacker to perform a wide range of malicious actions, including stealing the victim's session tokens or login credentials, defacing the page, or redirecting the user to a phishing site. Because the script runs in the security context of the Joomla site, it can access cookies, local storage, and perform actions on behalf of the authenticated user if the victim is logged in [2][4].

Mitigation

Status

As of the publication date, no official patch has been confirmed for this vulnerability. Users are advised to apply input validation and output encoding on the affected parameters, or to upgrade to a newer version of HikaShop if a security update becomes available. The vendor's website does not mention a fix, and the exploit has been publicly disclosed [2][4].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.