Home

Description

CubeCart is an ecommerce software solution. Prior to version 6.5.11, the contact form’s Enquiry field accepts raw HTML and that HTML is included verbatim in the email sent to the store admin. By submitting HTML in the Enquiry, the admin receives an email containing that HTML. This indicates user input is not being escaped or sanitized before being output in email (and possibly when re-rendering the form), leading to Cross-Site Scripting / HTML injection risk in email clients or admin UI. This issue has been patched in version 6.5.11.

PUBLISHED Reserved 2025-09-15 | Published 2025-09-22 | Updated 2025-09-22 | Assigner GitHub_M




MEDIUM: 5.4CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

< 6.5.11
affected

References

github.com/...art/v6/security/advisories/GHSA-5hg3-m3q3-v2p4 exploit

github.com/...art/v6/security/advisories/GHSA-5hg3-m3q3-v2p4

github.com/...ommit/299065bd4a8836782ce92f70988c730f130756db

github.com/...ommit/48336c54532705873a8c4106208c2d596f128047

cve.org (CVE-2025-59411)

nvd.nist.gov (CVE-2025-59411)

Download JSON