5.4 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
3.5 Low
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:S/C:N/I:P/A:N
0.001 Low
EPSS
Percentile
50.0%
(1) Checkout URL and Custom order id parameters are vulnerable to stored XSS, which are located in Shop > Settings > other settings > Advanced
(2) From e-mail address and From name parameters are vulnerable to stored XSS, which are located in Shop Settings > Autorespond E-mail settings > check your e-mail settings
(3) Template Name, Template type, From Name, From E-mail and Subject parameters are vulnerable to stored XSS, which are located in Shop Settings > Autorespond E-mail settings > Edit Templates / Add new email template
(4) Multiple fields in the settings of Payment method settings are vulnerable to stored XSS, which are located in Shop Settings > Autorespond E-mail settings > check your e-mail settings > Test Mail Sending Method
(5) Send test email to and Test mail subject parameters of Send test email function are vulnerable to stored XSS, which are located in Shop Settings > Payment > Settings of each method
Step (1) : Access https://demo.microweber.org/demo/admin/view:shop/action:options#option_group=shop/orders/settings/other
Step (2): Click Advanced
Step (3): Put payload below in Checkout URL or Custom order id parameter
"><img src>
Refresh this page, stored XSS will be triggered.
Step (1) : Access https://demo.microweber.org/demo/admin/view:settings#option_group=shop/orders/settings/setup_emails_on_order
Step (2): Click check your e-mail settings
Step (3): Put payload below in From e-mail address or From name parameter
"><img src>
Step (1) : Access https://demo.microweber.org/demo/admin/view:settings#option_group=shop/orders/settings/setup_emails_on_order
Step (2): Click Add new email template or Edit Templates
Step (3): Put payload below in Template Name, Template type, From Name, From E-mail or Subject parameters (*for type parameter, need to change in request)
"><img src>
Step (1) : Access https://demo.microweber.org/demo/admin/view:settings#option_group=shop/payments/admin
Step (2): Click Settings of Paypal Express
Step (3): Put payload below in Paypal username
"><img src>
Step (1) : Access https://demo.microweber.org/demo/admin/view:settings#option_group=email
Step (2): Click Test Mail Sending Method
Step (3): Put payload below in Send test email to or Test mail subject
"><img src>
Step (4): Click save email settings
If an attacker can control a script that is executed in the victim’s browser, they might compromise that user, in this case, an admin, by stealing its cookies.
5.4 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
3.5 Low
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:S/C:N/I:P/A:N
0.001 Low
EPSS
Percentile
50.0%