8
CVE-2026-21311
- EPSS 0.11%
- Veröffentlicht 11.03.2026 02:19:09
- Zuletzt bearbeitet 11.03.2026 18:08:37
- Quelle psirt@adobe.com
- CVE-Watchlists
- Unerledigt
Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a high-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality, and integrity impact to high. Exploitation of this issue requires user interaction in that a victim must browse to the page containing the vulnerable field.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Adobe ≫ Commerce B2b Version < 1.3.3
Adobe ≫ Commerce B2b Version1.3.3 Update-
Adobe ≫ Commerce B2b Version1.3.3 Updatep1
Adobe ≫ Commerce B2b Version1.3.3 Updatep10
Adobe ≫ Commerce B2b Version1.3.3 Updatep11
Adobe ≫ Commerce B2b Version1.3.3 Updatep12
Adobe ≫ Commerce B2b Version1.3.3 Updatep13
Adobe ≫ Commerce B2b Version1.3.3 Updatep14
Adobe ≫ Commerce B2b Version1.3.3 Updatep15
Adobe ≫ Commerce B2b Version1.3.3 Updatep16
Adobe ≫ Commerce B2b Version1.3.3 Updatep2
Adobe ≫ Commerce B2b Version1.3.3 Updatep3
Adobe ≫ Commerce B2b Version1.3.3 Updatep4
Adobe ≫ Commerce B2b Version1.3.3 Updatep5
Adobe ≫ Commerce B2b Version1.3.3 Updatep6
Adobe ≫ Commerce B2b Version1.3.3 Updatep7
Adobe ≫ Commerce B2b Version1.3.3 Updatep8
Adobe ≫ Commerce B2b Version1.3.3 Updatep9
Adobe ≫ Commerce B2b Version1.3.4 Update-
Adobe ≫ Commerce B2b Version1.3.4 Updatep1
Adobe ≫ Commerce B2b Version1.3.4 Updatep10
Adobe ≫ Commerce B2b Version1.3.4 Updatep11
Adobe ≫ Commerce B2b Version1.3.4 Updatep12
Adobe ≫ Commerce B2b Version1.3.4 Updatep13
Adobe ≫ Commerce B2b Version1.3.4 Updatep14
Adobe ≫ Commerce B2b Version1.3.4 Updatep15
Adobe ≫ Commerce B2b Version1.3.4 Updatep2
Adobe ≫ Commerce B2b Version1.3.4 Updatep3
Adobe ≫ Commerce B2b Version1.3.4 Updatep4
Adobe ≫ Commerce B2b Version1.3.4 Updatep5
Adobe ≫ Commerce B2b Version1.3.4 Updatep6
Adobe ≫ Commerce B2b Version1.3.4 Updatep7
Adobe ≫ Commerce B2b Version1.3.4 Updatep8
Adobe ≫ Commerce B2b Version1.3.4 Updatep9
Adobe ≫ Commerce B2b Version1.3.5 Update-
Adobe ≫ Commerce B2b Version1.3.5 Updatep1
Adobe ≫ Commerce B2b Version1.3.5 Updatep10
Adobe ≫ Commerce B2b Version1.3.5 Updatep11
Adobe ≫ Commerce B2b Version1.3.5 Updatep12
Adobe ≫ Commerce B2b Version1.3.5 Updatep13
Adobe ≫ Commerce B2b Version1.3.5 Updatep2
Adobe ≫ Commerce B2b Version1.3.5 Updatep3
Adobe ≫ Commerce B2b Version1.3.5 Updatep4
Adobe ≫ Commerce B2b Version1.3.5 Updatep5
Adobe ≫ Commerce B2b Version1.3.5 Updatep6
Adobe ≫ Commerce B2b Version1.3.5 Updatep7
Adobe ≫ Commerce B2b Version1.3.5 Updatep8
Adobe ≫ Commerce B2b Version1.3.5 Updatep9
Adobe ≫ Commerce B2b Version1.4.2 Update-
Adobe ≫ Commerce B2b Version1.4.2 Updatep1
Adobe ≫ Commerce B2b Version1.4.2 Updatep2
Adobe ≫ Commerce B2b Version1.4.2 Updatep3
Adobe ≫ Commerce B2b Version1.4.2 Updatep4
Adobe ≫ Commerce B2b Version1.4.2 Updatep5
Adobe ≫ Commerce B2b Version1.4.2 Updatep6
Adobe ≫ Commerce B2b Version1.4.2 Updatep7
Adobe ≫ Commerce B2b Version1.4.2 Updatep8
Adobe ≫ Commerce B2b Version1.5.2 Update-
Adobe ≫ Commerce B2b Version1.5.2 Updatep1
Adobe ≫ Commerce B2b Version1.5.2 Updatep2
Adobe ≫ Commerce B2b Version1.5.2 Updatep3
Adobe ≫ Commerce B2b Version1.5.3 Updatealpha1
Adobe ≫ Commerce B2b Version1.5.3 Updatealpha2
Adobe ≫ Commerce B2b Version1.5.3 Updatealpha3
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.11% | 0.291 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| psirt@adobe.com | 8 | 1.6 | 5.8 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N
|
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.