CVE-2025-47289

6.3 MEDIUM

📋 TL;DR

A stored cross-site scripting (XSS) vulnerability in CE Phoenix eCommerce platform allows attackers to inject malicious JavaScript into testimonial descriptions. When approved by an admin, this script executes in users' browsers, potentially stealing session cookies and leading to account takeover. Affects CE Phoenix versions 1.0.9.9 through 1.1.0.2.

💻 Affected Systems

Products:
  • CE Phoenix
Versions: 1.0.9.9 through 1.1.0.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default testimonial functionality; requires admin approval of malicious testimonial for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete account takeover of admin and user accounts, data exfiltration, and potential website defacement or malware distribution to visitors.

🟠

Likely Case

Session hijacking leading to unauthorized access to user accounts, potential data theft, and privilege escalation.

🟢

If Mitigated

Limited impact with proper input validation and output encoding, though still a security concern.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires submitting a testimonial (unauthenticated) and waiting for admin approval; public advisory includes technical details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.1.0.3

Vendor Advisory: https://github.com/CE-PhoenixCart/PhoenixCart/security/advisories/GHSA-98qq-m8qj-vvgj

Restart Required: No

Instructions:

1. Backup your database and files. 2. Download version 1.1.0.3 from the official repository. 3. Replace affected files with patched versions. 4. Clear any caches. 5. Test functionality.

🔧 Temporary Workarounds

Disable Testimonial Module

all

Temporarily disable the testimonial functionality to prevent exploitation.

Navigate to admin panel > Modules > Content > Testimonials > Disable

Implement Input Validation

all

Add server-side validation to sanitize testimonial description input.

Modify testimonial submission handler to strip/escape HTML/JavaScript tags

🧯 If You Can't Patch

  • Implement a web application firewall (WAF) with XSS protection rules
  • Enable Content Security Policy (CSP) headers to restrict script execution

🔍 How to Verify

Check if Vulnerable:

Check if running CE Phoenix version between 1.0.9.9 and 1.1.0.2 inclusive.

Check Version:

Check includes/version.php or admin panel for version number

Verify Fix Applied:

Verify installation of version 1.1.0.3 or later and test testimonial submission with script tags.

📡 Detection & Monitoring

Log Indicators:

  • Unusual testimonial submissions with script tags or JavaScript code
  • Multiple testimonial approvals in short time

Network Indicators:

  • Outbound connections to suspicious domains from testimonial pages
  • Unexpected JavaScript execution in browser dev tools

SIEM Query:

source="web_logs" AND (uri="/testimonials" OR uri="/admin/testimonials") AND (message="<script" OR message="javascript:")

🔗 References

📤 Share & Export