Skip to content

OroCommerce Cross-site Scripting vulnerability in add note dialog of Shopping List line item

Moderate severity GitHub Reviewed Published Oct 9, 2023 in oroinc/orocommerce • Updated Nov 8, 2023

Package

composer oro/commerce (Composer)

Affected versions

>= 4.1.0, <= 4.1.13
>= 4.2.0, <= 4.2.10
>= 5.0.0, < 5.0.11
>= 5.1.0, < 5.1.1

Patched versions

5.0.11
5.1.1

Description

Impact

The JS payload added to the product name may be executed at the storefront when adding a note to the shopping list line item containing a vulnerable product.
An attacker should be able to edit a product in the admin area and force a user to add this product to Shopping List and click add a note for it.

References

@dkhrysev dkhrysev published to oroinc/orocommerce Oct 9, 2023
Published by the National Vulnerability Database Oct 9, 2023
Published to the GitHub Advisory Database Oct 10, 2023
Reviewed Oct 10, 2023
Last updated Nov 8, 2023

Severity

Moderate
4.8
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
High
User interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N

Weaknesses

CVE ID

CVE-2022-35950

GHSA ID

GHSA-2jc6-3fhj-8q84

Source code

Checking history
See something to contribute? Suggest improvements for this vulnerability.