Description
Adobe Commerce versions 2.4.9-beta1, 2.4.8-p4, 2.4.7-p9, 2.4.6-p14, 2.4.5-p16, 2.4.4-p17 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a high-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim's browser when they browse to the page containing the vulnerable field. Scope is changed.
Published: 2026-05-12
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A stored Cross‑Site Scripting (XSS) flaw exists in Adobe Commerce that allows a high‑privileged attacker to inject malicious JavaScript into vulnerable form fields. When a user accesses a page containing the injected content, the script can execute in the victim’s browser. The vulnerability’s scope has been changed, meaning an attacker can potentially affect all higher‑privileged users when compromise occurs. The impact primarily concerns confidentiality and integrity of user sessions and may enable further exploitation beyond the original privilege level.

Affected Systems

The affected software is Adobe Commerce from Adobe. Versions 2.4.9‑beta1, 2.4.8‑p4, 2.4.7‑p9, 2.4.6‑p14, 2.4.5‑p16, 2.4.4‑p17 and all earlier releases are vulnerable.

Risk and Exploitability

The CVSS score of 4.8 indicates a moderate severity. The EPSS score is not available, and the vulnerability is not listed in CISA’s Known Exploited Vulnerabilities catalog. Because the attack vector is high‑privileged and the scope has changed, a successful exploitation can elevate the attacker’s privileges and enable them to run arbitrary code within a user’s browser. No publicly disclosed exploit is known, but the typical attack path requires the attacker to possess sufficient privileges to insert malicious data into the affected form fields.

Generated by OpenCVE AI on May 12, 2026 at 21:43 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Adobe Commerce to a patched version that removes the XSS flaw
  • Ensure all input from form fields is properly validated and encoded to prevent script injection
  • Apply a Content Security Policy that restricts script execution as a temporary protection

Generated by OpenCVE AI on May 12, 2026 at 21:43 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 13 May 2026 02:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 12 May 2026 23:00:00 +0000

Type Values Removed Values Added
First Time appeared Adobe
Adobe adobe Commerce
Vendors & Products Adobe
Adobe adobe Commerce

Tue, 12 May 2026 20:15:00 +0000

Type Values Removed Values Added
Description Adobe Commerce versions 2.4.9-beta1, 2.4.8-p4, 2.4.7-p9, 2.4.6-p14, 2.4.5-p16, 2.4.4-p17 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a high-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim's browser when they browse to the page containing the vulnerable field. Scope is changed.
Title Adobe Commerce | Cross-site Scripting (Stored XSS) (CWE-79)
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 4.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Adobe Adobe Commerce
cve-icon MITRE

Status: PUBLISHED

Assigner: adobe

Published:

Updated: 2026-05-13T01:33:56.890Z

Reserved: 2026-03-30T17:30:36.493Z

Link: CVE-2026-34658

cve-icon Vulnrichment

Updated: 2026-05-13T01:33:53.747Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-05-12T20:16:36.833

Modified: 2026-05-13T14:49:11.830

Link: CVE-2026-34658

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T22:45:15Z

Weaknesses