First published: Mon Mar 06 2023(Updated: )
Cross-site scripting vulnerability in Authentication Key Settings of EC-CUBE 4.0.0 to 4.0.6-p2, EC-CUBE 4.1.0 to 4.1.2-p1, and EC-CUBE 4.2.0 allows a remote authenticated attacker to inject an arbitrary script.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
EC-CUBE EC-CUBE | >=4.0.0<=4.0.6 | |
EC-CUBE EC-CUBE | >=4.1.0<=4.1.2 | |
EC-CUBE EC-CUBE | =4.0.6-p1 | |
EC-CUBE EC-CUBE | =4.0.6-p2 | |
EC-CUBE EC-CUBE | =4.1.2-p1 | |
EC-CUBE EC-CUBE | =4.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-25077 is medium, with a CVSS score of 5.4.
CVE-2023-25077 allows a remote authenticated attacker to inject an arbitrary script, potentially leading to cross-site scripting attacks.
EC-CUBE versions 4.0.0 to 4.0.6-p2, 4.1.0 to 4.1.2-p1, and 4.2.0 are affected by CVE-2023-25077.
To fix CVE-2023-25077 in EC-CUBE, update to a version that is not affected by the vulnerability.
More information about CVE-2023-25077 can be found at the following references: [JVN](https://jvn.jp/en/jp/JVN04785663/) and [EC-CUBE](https://www.ec-cube.net/info/weakness/20230214/).