Vulnerability Description
A weakness has been identified in detronetdip E-commerce 1.0.0. This affects the function get_safe_value of the file utility/function.php. Executing a manipulation can lead to cross site scripting. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Detronetdip | E-Commerce | 1.0.0 |
Related Weaknesses (CWE)
References
- https://github.com/Nixon-H/PHP-Stored-XSS-Bypass-Real-EscapeExploitMitigationThird Party Advisory
- https://github.com/detronetdip/E-commerce/Product
- https://github.com/detronetdip/E-commerce/issues/23ExploitIssue TrackingVendor Advisory
- https://vuldb.com/?ctiid.346487Permissions RequiredVDB Entry
- https://vuldb.com/?id.346487Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.754033Third Party AdvisoryVDB Entry
FAQ
What is CVE-2025-15583?
CVE-2025-15583 is a vulnerability with a CVSS score of 3.5 (LOW). A weakness has been identified in detronetdip E-commerce 1.0.0. This affects the function get_safe_value of the file utility/function.php. Executing a manipulation can lead to cross site scripting. Th...
How severe is CVE-2025-15583?
CVE-2025-15583 has been rated LOW with a CVSS base score of 3.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-15583?
Check the references section above for vendor advisories and patch information. Affected products include: Detronetdip E-Commerce.