
We found results for “”
CVE-2025-47272
Good to know:

Date: June 2, 2025
The CE Phoenix eCommerce platform, starting in version 1.0.9.7 and prior to version 1.1.0.3, allowed logged-in users to delete their accounts without requiring password re-authentication. An attacker with temporary access to an authenticated session (e.g., on a shared/public machine) could permanently delete the user’s account without knowledge of the password. This bypass of re-authentication puts users at risk of account loss and data disruption. Version 1.1.0.3 contains a patch for the issue.
Severity Score
Related Resources (4)
Severity Score
Weakness Type (CWE)
Missing Authentication for Critical Function
CWE-306Top Fix

Upgrade Version
Upgrade to version https://github.com/CE-PhoenixCart/PhoenixCart.git - v1.1.0.3
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | LOCAL |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | LOW |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | NONE |
Integrity (I): | NONE |
Availability (A): | HIGH |