A weakness has been identified in detronetdip E-commerce 1.0.0. This affects the function get_safe_value of the file utility/function.php. Executing a manipulation can lead to cross site scripting. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
https://vuldb.com/?submit.754033
https://vuldb.com/?ctiid.346487
https://github.com/detronetdip/E-commerce/issues/23
https://github.com/detronetdip/E-commerce/
https://github.com/Nixon-H/PHP-Stored-XSS-Bypass-Real-Escape
Published: 2026-02-20
Updated: 2026-02-20
Base Score: 4
Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:N
Severity: Medium
Base Score: 3.5
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
Severity: Low
Base Score: 5.1
Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
Severity: Medium
EPSS: 0.00034