Impact
An order status name entered by an administrator is rendered in the Commerce Orders table without proper escaping. When an admin updates the status of an order, the unescaped value can contain arbitrary JavaScript that is stored and later executed each time the order is viewed. This flaw allows script execution in the context of the Craft Commerce administrative interface.
Affected Systems
Craft Commerce, the ecommerce plugin for Craft CMS, is affected in all releases older than version 4.10.2 and 5.5.3.
Risk and Exploitability
The flaw receives a CVSS score of 1.9, indicating low severity, and an EPSS probability of less than 1%. It is not listed in the CISA KEV catalog. Exploitation requires the attacker to be authenticated and to have permission to edit order statuses, which means the attack vector is local and privileged. While the low severity score reduces overall risk, the ability to execute arbitrary script within the admin interface is a notable security concern.
OpenCVE Enrichment
Github GHSA