{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-15583","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-02-18T14:09:54.412Z","datePublished":"2026-02-20T16:32:10.015Z","dateUpdated":"2026-02-23T19:34:06.226Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-23T10:26:47.882Z"},"title":"detronetdip E-commerce function.php get_safe_value cross site scripting","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-79","lang":"en","description":"Cross Site Scripting"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-94","lang":"en","description":"Code Injection"}]}],"affected":[{"vendor":"detronetdip","product":"E-commerce","versions":[{"version":"1.0.0","status":"affected"}],"cpes":["cpe:2.3:a:detronetdip:e-commerce:*:*:*:*:*:*:*:*"]}],"descriptions":[{"lang":"en","value":"A weakness has been identified in detronetdip E-commerce 1.0.0. This affects the function get_safe_value of the file utility/function.php. Executing a manipulation can lead to cross site scripting. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.1,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":3.5,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.5,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":4,"vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:N/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-02-18T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-02-18T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-02-22T19:49:13.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Nixon-H (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.346487","name":"VDB-346487 | detronetdip E-commerce function.php get_safe_value cross site scripting","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.346487","name":"VDB-346487 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.754033","name":"Submit #754033 | detronetdip E-commerce 1.0 Cross-Site Scripting (XSS)","tags":["third-party-advisory"]},{"url":"https://github.com/detronetdip/E-commerce/issues/23","tags":["issue-tracking"]},{"url":"https://github.com/Nixon-H/PHP-Stored-XSS-Bypass-Real-Escape","tags":["exploit"]},{"url":"https://github.com/detronetdip/E-commerce/","tags":["product"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-23T19:33:40.543845Z","id":"CVE-2025-15583","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-23T19:34:06.226Z"}}]}}