A weakness has been identified in detronetdip E-commerce 1.0.0. This affects the function get_safe_value of the file utility/function.php. Executing a manipulation can lead to cross site scripting. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
References
| Link | Resource |
|---|---|
| https://github.com/Nixon-H/PHP-Stored-XSS-Bypass-Real-Escape | Exploit Mitigation Third Party Advisory |
| https://github.com/detronetdip/E-commerce/ | Product |
| https://github.com/detronetdip/E-commerce/issues/23 | Exploit Issue Tracking Vendor Advisory |
| https://vuldb.com/?ctiid.346487 | Permissions Required VDB Entry |
| https://vuldb.com/?id.346487 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.754033 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2026-02-20 17:25
Updated : 2026-02-26 03:09
NVD link : CVE-2025-15583
Mitre link : CVE-2025-15583
CVE.ORG link : CVE-2025-15583
JSON object : View
Products Affected
detronetdip
- e-commerce
