A vulnerability was found in CodeAstro Ecommerce Website 1.0. This impacts an unknown function of the file /customer/my_account.php?edit_account of the component Edit Your Account Page. Performing manipulation of the argument Username results in cross site scripting. It is possible to initiate the attack remotely. The exploit has been made public and could be used.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-25380 A vulnerability was found in CodeAstro Ecommerce Website 1.0. This impacts an unknown function of the file /customer/my_account.php?edit_account of the component Edit Your Account Page. Performing manipulation of the argument Username results in cross site scripting. It is possible to initiate the attack remotely. The exploit has been made public and could be used.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 25 Aug 2025 11:00:00 +0900

Type Values Removed Values Added
CPEs cpe:2.3:a:codeastro:ecommerce_website:1.0:*:*:*:*:*:*:*

Thu, 21 Aug 2025 21:45:00 +0900

Type Values Removed Values Added
First Time appeared Codeastro
Codeastro ecommerce Website
Vendors & Products Codeastro
Codeastro ecommerce Website

Thu, 21 Aug 2025 04:15:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 21 Aug 2025 02:45:00 +0900

Type Values Removed Values Added
Description A vulnerability was found in CodeAstro Ecommerce Website 1.0. This impacts an unknown function of the file /customer/my_account.php?edit_account of the component Edit Your Account Page. Performing manipulation of the argument Username results in cross site scripting. It is possible to initiate the attack remotely. The exploit has been made public and could be used.
Title CodeAstro Ecommerce Website Edit Your Account my_account.php cross site scripting
Weaknesses CWE-79
CWE-94
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:N/I:P/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 3.5, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 3.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2025-08-20T18:50:38.214Z

Reserved: 2025-08-20T10:57:35.036Z

Link: CVE-2025-9237

cve-icon Vulnrichment

Updated: 2025-08-20T18:50:35.000Z

cve-icon NVD

Status : Analyzed

Published: 2025-08-20T18:15:36.553

Modified: 2025-08-25T01:56:42.740

Link: CVE-2025-9237

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-08-21T21:30:53Z

Weaknesses