Description
CubeCart is an ecommerce software solution. Prior to version 6.5.11, the contact form’s Enquiry field accepts raw HTML and that HTML is included verbatim in the email sent to the store admin. By submitting HTML in the Enquiry, the admin receives an email containing that HTML. This indicates user input is not being escaped or sanitized before being output in email (and possibly when re-rendering the form), leading to Cross-Site Scripting / HTML injection risk in email clients or admin UI. This issue has been patched in version 6.5.11.
References (3)
Core 3
Core References
Exploit, Vendor Advisory x_refsource_confirm
https://github.com/cubecart/v6/security/advisories/GHSA-5hg3-m3q3-v2p4
Patch x_refsource_misc
https://github.com/cubecart/v6/commit/299065bd4a8836782ce92f70988c730f130756db
Patch x_refsource_misc
https://github.com/cubecart/v6/commit/48336c54532705873a8c4106208c2d596f128047
Scores
CVSS v3
5.4
EPSS
0.0004
EPSS Percentile
10.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-79
Status
published
Products (1)
cubecart/cubecart
< 6.5.11
Published
Sep 22, 2025
Tracked Since
Feb 18, 2026