No advisories yet.
Solution
The vulnerabilities have been fixed by the Cradle team in the latest version of Cradle eCommerce. This issue does not affect Cradle CMS, as it does not include products or collections, nor does it have customer accounts for logging in.
Workaround
No workaround given by the vendor.
Tue, 12 May 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
E-commerce
E-commerce cradle |
|
| Vendors & Products |
E-commerce
E-commerce cradle |
Mon, 11 May 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 11 May 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Reflected Cross-Site Scripting (XSS) in the latest demo version of the Cradle eCommerce platform. User-controlled input is insecurely reflected in the HTML output in the endpoint /product/. Exploitation of this vulnerability would allow an attacker to execute arbitrary JavaScript code. | |
| Title | Multiple vulnerabilities in Cradle e-commerce | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2026-05-11T17:33:57.767Z
Reserved: 2026-02-27T10:16:12.434Z
Link: CVE-2026-3320
Updated: 2026-05-11T17:33:54.632Z
Status : Received
Published: 2026-05-11T16:17:31.000
Modified: 2026-05-11T16:17:31.000
Link: CVE-2026-3320
No data.
OpenCVE Enrichment
Updated: 2026-05-12T09:23:09Z