CVE-2026-25489
Unknown Unknown - Not Provided
Stored XSS in Craft Commerce Tax Zones Allows Admin Browser Attack

Publication date: 2026-02-03

Last updated on: 2026-02-10

Assigner: GitHub, Inc.

Description
Craft Commerce is an ecommerce platform for Craft CMS. In versions from 4.0.0-RC1 to 4.10.0 and from 5.0.0 to 5.5.1, a stored XSS vulnerability in Craft Commerce allows attackers to execute malicious JavaScript in an administrator’s browser. This occurs because the Name & Description fields in Tax Zones are not properly sanitized before being displayed in the admin panel. This issue has been patched in versions 4.10.1 and 5.5.2.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-03
Last Modified
2026-02-10
Generated
2026-05-07
AI Q&A
2026-02-04
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 4 associated CPEs
Vendor Product Version / Range
craftcms craft_commerce From 4.0.1 (inc) to 4.10.1 (exc)
craftcms craft_commerce From 5.0.0 (inc) to 5.5.2 (exc)
craftcms craft_commerce 4.0.0
craftcms craft_commerce 4.0.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided information does not specify how the stored XSS vulnerability in Craft Commerce directly affects compliance with common standards and regulations such as GDPR or HIPAA.


Can you explain this vulnerability to me?

CVE-2026-25489 is a stored Cross-Site Scripting (XSS) vulnerability in Craft Commerce, an ecommerce platform for Craft CMS. It affects the Name and Description fields of Tax Zones in the admin panel because these fields are not properly sanitized before being displayed.

An attacker with access to the control panel and permissions to manage store settings and taxes can inject malicious JavaScript code into these fields. When an administrator views the Tax Zones page, the malicious script executes in their browser.

This vulnerability can be exploited to execute arbitrary JavaScript, and with more complex payloads, attackers can escalate their privileges to administrator by modifying their user permissions via the admin users API.


How can this vulnerability impact me? :

[{'type': 'paragraph', 'content': "This vulnerability can lead to the execution of malicious JavaScript in an administrator's browser, potentially allowing attackers to hijack admin sessions or perform actions on behalf of the administrator."}, {'type': 'paragraph', 'content': 'More seriously, attackers can escalate their privileges to administrator by exploiting the vulnerability to modify their user permissions, gaining full control over the Craft Commerce platform.'}, {'type': 'paragraph', 'content': 'Attackers can automate the attack by forcing victim logout to trigger re-authentication or by phishing administrator credentials using fake login modals, increasing the risk of compromise.'}] [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by checking if your Craft Commerce installation is running a vulnerable version and by inspecting the Tax Zones Name and Description fields for malicious JavaScript payloads.'}, {'type': 'paragraph', 'content': 'Specifically, detection involves verifying the version of Craft Commerce to see if it falls within the affected ranges (4.0.0-RC1 to 4.10.0 and 5.0.0 to 5.5.1).'}, {'type': 'paragraph', 'content': 'You can also manually review or query the database entries for Tax Zones to identify suspicious scripts in the Name or Description fields.'}, {'type': 'list_item', 'content': 'Check Craft Commerce version via the admin panel or command line.'}, {'type': 'list_item', 'content': "Query the database for Tax Zones entries containing suspicious script tags or event handlers, for example using SQL commands like: SELECT id, name, description FROM taxzones WHERE name LIKE '%<script%' OR description LIKE '%<script%' OR name LIKE '%onerror=%' OR description LIKE '%onerror=%';"}, {'type': 'list_item', 'content': 'Manually inspect the Tax Zones page in the admin panel for unexpected JavaScript execution or unusual content in the Name and Description fields.'}] [1]


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade Craft Commerce to a patched version where this vulnerability is fixed.

  • Upgrade to Craft Commerce version 4.10.1 or later if you are on the 4.x branch.
  • Upgrade to Craft Commerce version 5.5.2 or later if you are on the 5.x branch.

Additionally, restrict administrative access to trusted users only and monitor for suspicious activity in the admin panel.

Avoid using accounts with elevated privileges for routine tasks to reduce the risk of exploitation.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart