First published: Fri Feb 27 2015(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in zencart-ja (aka Zen Cart Japanese edition) 1.3 jp through 1.3.0.2 jp8 and 1.5 ja through 1.5.1 ja allow remote attackers to inject arbitrary web script or HTML via a crafted parameter, related to admin/includes/init_includes/init_sanitize.php and includes/init_includes/init_sanitize.php.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Zen Cart | =1.3.0.0 | |
Zen Cart | =1.3.0.1 | |
Zen Cart | =1.3.0.2 | |
Zen Cart | =1.5.0 | |
Zen Cart | =1.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0882 has been classified as a medium severity vulnerability due to its potential for exploitation through cross-site scripting.
To mitigate CVE-2015-0882, update Zen Cart to the latest version that has patched these vulnerabilities.
CVE-2015-0882 affects Zen Cart versions 1.3.0.0 to 1.3.0.2 and 1.5.0 to 1.5.1.
CVE-2015-0882 allows remote attackers to conduct cross-site scripting attacks, potentially leading to session hijacking or data manipulation.
CVE-2015-0882 was disclosed publicly and is documented in various cybersecurity databases.