VYPR
Moderate severityOSV Advisory· Published Feb 3, 2026· Updated Feb 4, 2026

Craft Commerce has Stored XSS via Order Status Message with potential database exfiltration

CVE-2026-25483

Description

Craft Commerce is an ecommerce platform for Craft CMS. In versions from 4.0.0-RC1 to 4.10.0 and from 5.0.0 to 5.5.1, a stored XSS vulnerability exists in Craft Commerce’s Order Status History Message. The message is rendered using the |md filter, which permits raw HTML, enabling malicious script execution. If a user has database backup utility permissions (which do not require an elevated session), an attacker can exfiltrate the entire database, including all user credentials, customer PII, order history, and 2FA recovery codes. This issue has been patched in versions 4.10.1 and 5.5.2.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
craftcms/commercePackagist
>= 5.0.0, < 5.5.25.5.2
craftcms/commercePackagist
>= 4.0.0-RC1, < 4.10.14.10.1

Affected products

1

Patches

1
4665a47c0961

Fix encoding

https://github.com/craftcms/commerceLuke HolderDec 30, 2025via ghsa
1 file changed · +1 1
  • src/templates/settings/orderstatuses/index.twig+1 1 modified
    @@ -52,7 +52,7 @@
                   url: orderStatus.cpEditUrl,
                   html: orderStatus.labelHtml|raw
               },
    -          title: orderStatus.name|t('site'),
    +          title: orderStatus.name|t('site')|e,
               url: orderStatus.cpEditUrl,
               handle: orderStatus.handle|e,
               hasEmails: orderStatus.emails|length ?:'',
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

6

News mentions

0

No linked articles in our index yet.