Description
Saleor is an e-commerce platform. Starting in version 3.0.0 and prior to versions 3.20.108, 3.21.43, and 3.22.27, Saleor was allowing users to modify rich text fields with HTML without running any backend HTML cleaners thus allowing malicious actors to perform stored XSS attacks on dashboards and storefronts. Malicious staff members could craft script injections to target other staff members, possibly stealing their access and/or refresh tokens. This issue has been patched in versions 3.22.27, 3.21.43, and 3.20.108. In case of inability to upgrade straight away, a possible workaround is to use client-side cleaner.
Published: 2026-01-21
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting on dashboards and storefronts, enabling theft of staff session tokens
Action: Patch immediately
AI Analysis

Impact

This vulnerability allows malicious code to be stored in Saleor rich‑text fields without server‑side sanitization, giving rise to stored cross‑site scripting. When the CMS renders these fields on dashboards or storefronts, injected scripts execute in the browsers of any user viewing the content, potentially stealing session or refresh tokens of privileged staff and compromising the backend. The weakness stems from improper HTML cleaning, corresponding to CWE‑79 and CWE‑83.

Affected Systems

The flaw is present in the Saleor e‑commerce platform released between the start of version 3.0.0 and the following unpatched release points: 3.20.107, 3.21.42, and 3.22.26. It does not affect later releases 3.20.108, 3.21.43, or 3.22.27 and any subsequent versions. Affected deployments use the saleor:CPE base cpe:2.3:a:saleor:saleor.

Risk and Exploitability

The CVSS score of 7.2 indicates high risk; the EPSS score below 1% suggests the probability of a publicly available exploit is low, and it has not been listed in CISA’s KEV catalog. However, since the attack vector requires authenticated access to rich‑text editing privileges, the risk is limited to insiders or compromised accounts. The lack of mitigation means a successful attack could lead to credential theft and possible full‑control takeover of the platform.

Generated by OpenCVE AI on April 18, 2026 at 04:10 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest patched Saleor release (≥3.22.27, ≥3.21.43, or ≥3.20.108).
  • If upgrading is not feasible immediately, implement a client‑side sanitizer for rich‑text fields (for example, using Editor.js with DOMPurify).
  • Restrict rich‑text editing privileges to trusted staff and enforce role‑based access controls to minimize the attack surface.

Generated by OpenCVE AI on April 18, 2026 at 04:10 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 29 Jan 2026 18:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-79
CPEs cpe:2.3:a:saleor:saleor:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 4.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}


Fri, 23 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Saleor
Saleor saleor
Vendors & Products Saleor
Saleor saleor

Thu, 22 Jan 2026 23:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 21 Jan 2026 21:45:00 +0000

Type Values Removed Values Added
Description Saleor is an e-commerce platform. Starting in version 3.0.0 and prior to versions 3.20.108, 3.21.43, and 3.22.27, Saleor was allowing users to modify rich text fields with HTML without running any backend HTML cleaners thus allowing malicious actors to perform stored XSS attacks on dashboards and storefronts. Malicious staff members could craft script injections to target other staff members, possibly stealing their access and/or refresh tokens. This issue has been patched in versions 3.22.27, 3.21.43, and 3.20.108. In case of inability to upgrade straight away, a possible workaround is to use client-side cleaner.
Title Saleor lacks proper HTML sanitization in rich text fields
Weaknesses CWE-83
References
Metrics cvssV4_0

{'score': 7.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-22T16:50:18.828Z

Reserved: 2026-01-12T16:20:16.745Z

Link: CVE-2026-22849

cve-icon Vulnrichment

Updated: 2026-01-22T15:09:37.102Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-21T22:15:49.533

Modified: 2026-01-29T18:17:46.110

Link: CVE-2026-22849

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T04:15:05Z

Weaknesses