Description
Loaded Commerce 6.6 contains a client-side template injection vulnerability that allows unauthenticated attackers to execute code on the server via the search parameter.
Published: 2025-12-04
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

Loaded Commerce 6.6 introduces a client‑side template injection flaw that allows unauthenticated attackers to execute arbitrary code on the server by manipulating the search parameter. The vulnerability is a direct command injection style weakness (CWE‑78), enabling code execution with the permissions of the web application process, thereby compromising confidentiality, integrity, and availability of the affected system.

Affected Systems

The flaw affects the Loaded Commerce product, specifically version 6.6. Users running this version are exposed to the risk and should verify their installation and consider upgrading.

Risk and Exploitability

The CVSS score of 6.9 indicates moderate severity. EPSS is below 1%, suggesting the likelihood of exploitation is low at present. The vulnerability is not catalogued in CISA's KEV list. Attack access is unauthenticated, relying on a client‑side input vector – the search field – to deliver malicious template payloads that are processed server‑side. No zero‑day exploitation evidence is present, but exploit code is available in public exploit databases.

Generated by OpenCVE AI on April 27, 2026 at 22:44 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any vendor‑supplied patch or upgrade to a version that fixes the template injection issue; if no patch is available, upgrade to a later major version of Loaded Commerce.
  • Strictly validate or whitelist the search parameter to allow only safe characters and length limits; reject or sanitize any input that resembles template syntax.
  • Employ a Web Application Firewall or similar filtering layer to block malicious template payloads before they reach the application logic.
  • Keep the application and its dependencies, including any template engines, updated to the latest security releases.

Generated by OpenCVE AI on April 27, 2026 at 22:44 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 09 Dec 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 05 Dec 2025 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Loadedcommerce
Loadedcommerce loaded Commerce
Vendors & Products Loadedcommerce
Loadedcommerce loaded Commerce

Thu, 04 Dec 2025 21:00:00 +0000

Type Values Removed Values Added
Description Loaded Commerce 6.6 contains a client-side template injection vulnerability that allows unauthenticated attackers to execute code on the server via the search parameter.
Title Loaded Commerce 6.6 Client-Side Template Injection(CSTI)
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

Loadedcommerce Loaded Commerce
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-07T14:09:50.391Z

Reserved: 2025-12-04T16:20:14.992Z

Link: CVE-2025-66572

cve-icon Vulnrichment

Updated: 2025-12-09T19:51:17.152Z

cve-icon NVD

Status : Deferred

Published: 2025-12-04T21:16:09.920

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-66572

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-27T22:45:15Z

Weaknesses