VYPR
Medium severityNVD Advisory· Published May 11, 2026· Updated May 13, 2026

CVE-2026-3320

CVE-2026-3320

Description

Reflected Cross-Site Scripting (XSS) in the latest demo version of the Cradle eCommerce platform. User-controlled input is insecurely reflected in the HTML output in the endpoint /product/. Exploitation of this vulnerability would allow an attacker to execute arbitrary JavaScript code.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Reflected XSS in Cradle eCommerce demo's /product/ endpoint allows arbitrary JavaScript execution via unvalidated user input.

Vulnerability

CVE-2026-3320 is a reflected cross-site scripting (XSS) vulnerability in the latest demo version of the Cradle eCommerce platform. The flaw exists in the /product/ endpoint, where user-controlled input is insecurely reflected in the HTML output without proper sanitization or encoding [1]. This is a classic instance of CWE-79 (Improper Neutralization of Input During Web Page Generation).

Exploitation

An attacker can craft a malicious URL containing JavaScript payloads in the vulnerable parameter and trick a user into clicking it. The attack requires user interaction (CVSS v4.0 base score 5.1) requires user interaction (UI:A) but no authentication (PR:N) and can be launched over the network (AV:N) [1]. The reflected payload executes in the victim's browser session within the context of the vulnerable domain.

Impact

Successful exploitation allows arbitrary JavaScript execution in the victim's browser. This can lead to session hijacking, defacement, theft of sensitive information displayed on the page, or further attacks against the user's session. The vulnerability is limited to the demo version of Cradle eCommerce and does not affect Cradle CMS [1].

Mitigation

The Cradle team has fixed this vulnerability in the latest version of Cradle eCommerce. Users running the demo version should update to the patched release. No workaround is provided, but the advisory recommends upgrading immediately [1].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.