CVE-2009-3592

Qualiteam X-Cart - Stored Cross-Site Scripting via Email Parameter in Subscribe Action

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2009-3592. PoCs published by Paulo Santos.

AI-analyzed exploit summary This exploit demonstrates a cross-site scripting (XSS) vulnerability in X-Cart's email subscription component. The vulnerability arises due to insufficient sanitization of user-supplied input in the 'email' parameter, allowing arbitrary script execution in the context of the affected site.

Description

Cross-site scripting (XSS) vulnerability in customer/home.php in Qualiteam X-Cart allows remote attackers to inject arbitrary web script or HTML via the email parameter in a subscribed action, a different vector than CVE-2005-1823.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Paulo Santos · textwebappsphp
https://www.exploit-db.com/exploits/33267

This exploit demonstrates a cross-site scripting (XSS) vulnerability in X-Cart's email subscription component. The vulnerability arises due to insufficient sanitization of user-supplied input in the 'email' parameter, allowing arbitrary script execution in the context of the affected site.

Classification
Working Poc 90%
Attack Type
Xss
Complexity
Trivial
Reliability
Reliable
Target: X-Cart (version not specified)
No auth needed
Prerequisites: Access to the target X-Cart application · User interaction to trigger the XSS payload
MITRE ATT&CK
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (3)

Core 3
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/53664
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/36601

Scores

EPSS 0.0115
EPSS Percentile 78.8%

Details

CWE
CWE-79
Status published
Products (1)
qtmsoft/x-cart
Published Oct 08, 2009
Tracked Since Feb 18, 2026