Description
Craft Commerce is an ecommerce platform for Craft CMS. Prior to 4.10.2 and 5.5.3, a Stored Cross-Site Scripting (XSS) vulnerability exists in the Craft Commerce Order details. Malicious JavaScript can be injected via the Shipping Method Name, Order Reference, or Site Name. When a user opens the order details slideout via a double-click on the order index page, the injected payload executes. This vulnerability is fixed in 4.10.2 and 5.5.3.
Published: 2026-03-10
Score: 1.9 Low
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting (XSS) in Craft Commerce Order Details
Action: Apply Patch
AI Analysis

Impact

Craft Commerce includes a stored XSS flaw in the Order Details slideout. An attacker can inject malicious JavaScript through the Shipping Method Name, Order Reference, or Site Name fields. When an authorized user opens the order details by double‑clicking an order in the index page, the payload is rendered and executed in that user’s browser. This could lead to theft of session cookies, injection of further payloads, or unauthorized actions performed under the user’s identity.

Affected Systems

The vulnerability is present in Craft Commerce releases prior to version 4.10.2 and 5.5.3. Any installation running an affected version of the e‑commerce plugin is susceptible.

Risk and Exploitability

TheSS score of 1.9 indicates a low severity assessment, and the EPSS score is below 1 %, suggesting a low probability of exploitation. It is not listed in CISA’s KEV catalog. The attack vector is likely restricted to users with permission to view order details, making exploitation dependent on administrative credentials.

Generated by OpenCVE AI on April 16, 2026 at 09:31 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Craft Commerce to version 4.10.2 or later, or 5.5.3 or later to receive the vendor patch.
  • If upgrading immediately is not possible, modify the template rendering the order details slideout so that the Shipping Method Name, Order Reference, and Site Name are HTML‑escaped before display, preventing script execution.
  • Apply a Content Security Policy that blocks inline scripts and limits script sources to trusted domains, mitigating the impact of any residual injection.

Generated by OpenCVE AI on April 16, 2026 at 09:31 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-mj32-r678-7mvp Craft Commerce has stored XSS in Craft Commerce Order Details Slideout
History

Wed, 11 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Craftcms craft Commerce
CPEs cpe:2.3:a:craftcms:craft_commerce:*:*:*:*:*:craft_cms:*:*
Vendors & Products Craftcms craft Commerce
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}


Wed, 11 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Craftcms
Craftcms commerce
Vendors & Products Craftcms
Craftcms commerce

Tue, 10 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Description Craft Commerce is an ecommerce platform for Craft CMS. Prior to 4.10.2 and 5.5.3, a Stored Cross-Site Scripting (XSS) vulnerability exists in the Craft Commerce Order details. Malicious JavaScript can be injected via the Shipping Method Name, Order Reference, or Site Name. When a user opens the order details slideout via a double-click on the order index page, the injected payload executes. This vulnerability is fixed in 4.10.2 and 5.5.3.
Title Craft Commerce has Stored XSS in Craft Commerce Order Details Slideout
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 1.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Craftcms Commerce Craft Commerce
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-10T20:12:39.344Z

Reserved: 2026-03-04T14:44:00.713Z

Link: CVE-2026-29177

cve-icon Vulnrichment

Updated: 2026-03-10T20:11:40.529Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-10T20:16:39.037

Modified: 2026-03-11T15:07:13.647

Link: CVE-2026-29177

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T09:45:31Z

Weaknesses