{"api_version":"1","generated_at":"2026-04-21T16:54:29+00:00","cve":"CVE-2021-27190","urls":{"html":"https://cve.report/CVE-2021-27190","api":"https://cve.report/api/cve/CVE-2021-27190.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-27190","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-27190"},"summary":{"title":"CVE-2021-27190","description":"A Stored Cross Site Scripting(XSS) Vulnerability was discovered in PEEL SHOPPING 9.3.0 and 9.4.0, which are publicly available. The user supplied input containing polyglot payload is echoed back in javascript code in HTML response. This allows an attacker to input malicious JavaScript which can steal cookie, redirect them to other malicious website, etc.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2021-02-12 03:15:00","updated_at":"2021-12-07 20:29:00"},"problem_types":["CWE-79"],"metrics":[],"references":[{"url":"https://github.com/anmolksachan/CVE-2021-27190-PEEL-Shopping-cart-9.3.0-Stored-XSS","name":"https://github.com/anmolksachan/CVE-2021-27190-PEEL-Shopping-cart-9.3.0-Stored-XSS","refsource":"MISC","tags":["Exploit","Third Party Advisory"],"title":"GitHub - anmolksachan/CVE-2021-27190-PEEL-Shopping-cart-9.3.0-Stored-XSS","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.peel-shopping.com/modules/telechargement/telecharger.php?id=7","name":"https://www.peel-shopping.com/modules/telechargement/telecharger.php?id=7","refsource":"MISC","tags":["Product"],"title":"Free download open source - PEEL SHOPPING Ecommerce software","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.secuneus.com/cve-2021-27190-peel-shopping-ecommerce-shopping-cart-stored-cross-site-scripting-vulnerability-in-address/","name":"https://www.secuneus.com/cve-2021-27190-peel-shopping-ecommerce-shopping-cart-stored-cross-site-scripting-vulnerability-in-address/","refsource":"MISC","tags":["Exploit","Third Party Advisory"],"title":"CVE-2021-27190 – PEEL Shopping, eCommerce shopping cart – Stored Cross-Site Scripting Vulnerability in ‘Address’ – Secuneus Tech | We Secure Digital","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/vulf/Peel-Shopping-cart-9.4.0-Stored-XSS","name":"https://github.com/vulf/Peel-Shopping-cart-9.4.0-Stored-XSS","refsource":"MISC","tags":[],"title":"GitHub - vulf/Peel-Shopping-cart-9.4.0-Stored-XSS","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/advisto/peel-shopping/issues/4#issuecomment-953461611","name":"https://github.com/advisto/peel-shopping/issues/4#issuecomment-953461611","refsource":"MISC","tags":[],"title":"Stored Cross site Scripting in \"‘Address’\" parameter (Peel Shopping 9.4.0) · Issue #4 · advisto/peel-shopping · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-27190","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-27190","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"27190","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"peel","cpe5":"peel_shopping","cpe6":"9.3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"27190","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"peel","cpe5":"peel_shopping","cpe6":"9.4.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"27190","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"peel","cpe5":"peel_shopping","cpe6":"9.3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2021-27190","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A Stored Cross Site Scripting(XSS) Vulnerability was discovered in PEEL SHOPPING 9.3.0 and 9.4.0, which are publicly available. The user supplied input containing polyglot payload is echoed back in javascript code in HTML response. This allows an attacker to input malicious JavaScript which can steal cookie, redirect them to other malicious website, etc."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://www.peel-shopping.com/modules/telechargement/telecharger.php?id=7","refsource":"MISC","name":"https://www.peel-shopping.com/modules/telechargement/telecharger.php?id=7"},{"refsource":"MISC","name":"https://www.secuneus.com/cve-2021-27190-peel-shopping-ecommerce-shopping-cart-stored-cross-site-scripting-vulnerability-in-address/","url":"https://www.secuneus.com/cve-2021-27190-peel-shopping-ecommerce-shopping-cart-stored-cross-site-scripting-vulnerability-in-address/"},{"refsource":"MISC","name":"https://github.com/anmolksachan/CVE-2021-27190-PEEL-Shopping-cart-9.3.0-Stored-XSS","url":"https://github.com/anmolksachan/CVE-2021-27190-PEEL-Shopping-cart-9.3.0-Stored-XSS"},{"refsource":"MISC","name":"https://github.com/vulf/Peel-Shopping-cart-9.4.0-Stored-XSS","url":"https://github.com/vulf/Peel-Shopping-cart-9.4.0-Stored-XSS"},{"refsource":"MISC","name":"https://github.com/advisto/peel-shopping/issues/4#issuecomment-953461611","url":"https://github.com/advisto/peel-shopping/issues/4#issuecomment-953461611"}]}},"nvd":{"publishedDate":"2021-02-12 03:15:00","lastModifiedDate":"2021-12-07 20:29:00","problem_types":["CWE-79"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":5.4,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.3,"impactScore":2.7},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:N/I:P/A:N","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":3.5},"severity":"LOW","exploitabilityScore":6.8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:peel:peel_shopping:9.3.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:peel:peel_shopping:9.4.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"27190","Ordinal":"202276","Title":"CVE-2021-27190","CVE":"CVE-2021-27190","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"27190","Ordinal":"1","NoteData":"A Stored Cross Site Scripting(XSS) Vulnerability was discovered in PEEL SHOPPING 9.3.0 and 9.4.0, which are publicly available. The user supplied input containing polyglot payload is echoed back in javascript code in HTML response. This allows an attacker to input malicious JavaScript which can steal cookie, redirect them to other malicious website, etc.","Type":"Description","Title":null},{"CveYear":"2021","CveId":"27190","Ordinal":"2","NoteData":"2021-02-11","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"27190","Ordinal":"3","NoteData":"2021-11-03","Type":"Other","Title":"Modified"}]}}}