Unrated severityNVD Advisory· Published Sep 22, 2025· Updated Sep 22, 2025
CubeCart Stored/Reflected HTML Injection Vulnerability in Contact Enquiry
CVE-2025-59411
Description
CubeCart is an ecommerce software solution. Prior to version 6.5.11, the contact form’s Enquiry field accepts raw HTML and that HTML is included verbatim in the email sent to the store admin. By submitting HTML in the Enquiry, the admin receives an email containing that HTML. This indicates user input is not being escaped or sanitized before being output in email (and possibly when re-rendering the form), leading to Cross-Site Scripting / HTML injection risk in email clients or admin UI. This issue has been patched in version 6.5.11.
Affected products
2- cubecart/v6v5Range: < 6.5.11
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/cubecart/v6/commit/299065bd4a8836782ce92f70988c730f130756dbmitrex_refsource_MISC
- github.com/cubecart/v6/commit/48336c54532705873a8c4106208c2d596f128047mitrex_refsource_MISC
- github.com/cubecart/v6/security/advisories/GHSA-5hg3-m3q3-v2p4mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.