CVE-2025-59411

medium

Description

CubeCart is an ecommerce software solution. Prior to version 6.5.11, the contact form’s Enquiry field accepts raw HTML and that HTML is included verbatim in the email sent to the store admin. By submitting HTML in the Enquiry, the admin receives an email containing that HTML. This indicates user input is not being escaped or sanitized before being output in email (and possibly when re-rendering the form), leading to Cross-Site Scripting / HTML injection risk in email clients or admin UI. This issue has been patched in version 6.5.11.

References

https://github.com/cubecart/v6/security/advisories/GHSA-5hg3-m3q3-v2p4

https://github.com/cubecart/v6/commit/48336c54532705873a8c4106208c2d596f128047

https://github.com/cubecart/v6/commit/299065bd4a8836782ce92f70988c730f130756db

Details

Source: Mitre, NVD

Published: 2025-09-22

Updated: 2025-09-23

Risk Information

CVSS v2

Base Score: 6.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N

Severity: Medium

CVSS v3

Base Score: 5.4

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N

Severity: Medium

EPSS

EPSS: 0.00028