CVE-2025-15583

A weakness has been identified in detronetdip E-commerce 1.0.0. This affects the function get_safe_value of the file utility/function.php. Executing a manipulation can lead to cross site scripting. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
References
Link Resource
https://github.com/Nixon-H/PHP-Stored-XSS-Bypass-Real-Escape Exploit Mitigation Third Party Advisory
https://github.com/detronetdip/E-commerce/ Product
https://github.com/detronetdip/E-commerce/issues/23 Exploit Issue Tracking Vendor Advisory
https://vuldb.com/?ctiid.346487 Permissions Required VDB Entry
https://vuldb.com/?id.346487 Third Party Advisory VDB Entry
https://vuldb.com/?submit.754033 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:detronetdip:e-commerce:1.0.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-02-20 17:25

Updated : 2026-02-26 03:09


NVD link : CVE-2025-15583

Mitre link : CVE-2025-15583

CVE.ORG link : CVE-2025-15583


JSON object : View

Products Affected

detronetdip

  • e-commerce
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-94

Improper Control of Generation of Code ('Code Injection')