CVE-2026-29177
Received Received - Intake
Stored XSS in Craft Commerce Order Details Allows Script Execution

Publication date: 2026-03-10

Last updated on: 2026-03-11

Assigner: GitHub, Inc.

Description
Craft Commerce is an ecommerce platform for Craft CMS. Prior to 4.10.2 and 5.5.3, a Stored Cross-Site Scripting (XSS) vulnerability exists in the Craft Commerce Order details. Malicious JavaScript can be injected via the Shipping Method Name, Order Reference, or Site Name. When a user opens the order details slideout via a double-click on the order index page, the injected payload executes. This vulnerability is fixed in 4.10.2 and 5.5.3.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-10
Last Modified
2026-03-11
Generated
2026-05-07
AI Q&A
2026-03-10
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
craftcms craft_commerce From 4.0.0 (inc) to 4.10.2 (exc)
craftcms craft_commerce From 5.0.0 (inc) to 5.5.3 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a Stored Cross-Site Scripting (XSS) issue in Craft Commerce, an ecommerce platform for Craft CMS. It occurs in the Order details section where malicious JavaScript code can be injected through fields such as the Shipping Method Name, Order Reference, or Site Name.

When a user opens the order details slideout by double-clicking on the order index page, the injected malicious script executes, potentially compromising the user's session or data.

This vulnerability affects versions prior to 4.10.2 and 5.5.3 and has been fixed in those versions.


How can this vulnerability impact me? :

The impact of this vulnerability is that an attacker can inject and execute malicious JavaScript code within the order details interface.

This can lead to unauthorized actions such as session hijacking, theft of sensitive information, or performing actions on behalf of the user without their consent.

Since the vulnerability requires a user to open the order details slideout, it relies on user interaction but can still pose a significant security risk.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, upgrade Craft Commerce to version 4.10.2 or later if you are using the 4.x branch, or to version 5.5.3 or later if you are using the 5.x branch. These versions contain the fix for the Stored Cross-Site Scripting (XSS) vulnerability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart