{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-07T17:02:32.192","vulnerabilities":[{"cve":{"id":"CVE-2026-29173","sourceIdentifier":"security-advisories@github.com","published":"2026-03-10T20:16:38.383","lastModified":"2026-03-11T16:55:37.987","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Craft Commerce is an ecommerce platform for Craft CMS. Prior to 4.10.2 and 5.5.3, a stored XSS vulnerability exists when a user tries to update the Order Status from the Commerce Orders Table. The Order Status Name is rendered without proper escaping, allowing script execution to occur. This vulnerability is fixed in 4.10.2 and 5.5.3."},{"lang":"es","value":"Craft Commerce es una plataforma de comercio electrónico para Craft CMS. Antes de 4.10.2 y 5.5.3, existe una vulnerabilidad XSS almacenada cuando un usuario intenta actualizar el estado del pedido desde la tabla de pedidos de Commerce. El nombre del estado del pedido se renderiza sin el escape adecuado, permitiendo la ejecución de scripts. Esta vulnerabilidad está corregida en 4.10.2 y 5.5.3."}],"metrics":{"cvssMetricV40":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":1.9,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"HIGH","userInteraction":"PASSIVE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnAvailabilityImpact":"NONE","subConfidentialityImpact":"LOW","subIntegrityImpact":"LOW","subAvailabilityImpact":"NONE","exploitMaturity":"PROOF_OF_CONCEPT","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}],"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N","baseScore":4.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":1.7,"impactScore":2.7}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:craftcms:craft_commerce:*:*:*:*:*:craft_cms:*:*","versionStartIncluding":"4.0.0","versionEndExcluding":"4.10.2","matchCriteriaId":"21ABE060-9AA9-4E13-A387-89028A7D990F"},{"vulnerable":true,"criteria":"cpe:2.3:a:craftcms:craft_commerce:*:*:*:*:*:craft_cms:*:*","versionStartIncluding":"5.0.0","versionEndExcluding":"5.5.3","matchCriteriaId":"2690BD5E-2A88-4CDC-AAD6-DD02B96E1A46"}]}]}],"references":[{"url":"https://github.com/craftcms/commerce/commit/60cdc505c03b6fa2f59715e8c060114b66334afa","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/craftcms/commerce/commit/a2ea853935ef03297ea1298bdb0d8c55ec5daf7b","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/craftcms/commerce/security/advisories/GHSA-mqxf-2998-c6cp","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]}]}}]}