Upsell shop information of an account can be manipulated to execute script code in the context of the users browser session. To exploit this an attacker would require temporary access to a users account or an successful social engineering attack to lure users to maliciously configured accounts. Attackers could perform malicious API requests or extract information from the users account. Please deploy the provided updates and patch releases. Sanitization of user-defined upsell content has been improved. No publicly available exploits are known.
History

Wed, 05 Nov 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 04 Nov 2025 19:30:00 +0000

Type Values Removed Values Added
References

cve-icon MITRE

Status: PUBLISHED

Assigner: OX

Published: 2024-04-08T08:09:12.210Z

Updated: 2025-11-04T18:23:44.547Z

Reserved: 2024-01-12T07:03:12.862Z

Link: CVE-2024-23190

cve-icon Vulnrichment

Updated: 2025-11-04T18:23:44.547Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-04-08T09:15:09.637

Modified: 2025-11-04T19:16:33.647

Link: CVE-2024-23190

cve-icon Redhat

No data.