CVE-2025-13002
Published: 12 February 2026
Summary
CVE-2025-13002 is a high-severity Cross-site Scripting (CWE-79) vulnerability in Farktor E-Commerce Package. Its CVSS base score is 8.2 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 2.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses improper neutralization of input during web page generation by filtering output to prevent XSS script injection.
Validates user inputs to block malicious payloads that could lead to XSS in the E-Commerce Package.
Remediates the specific XSS flaw in E-Commerce Package versions through 27112025 by applying timely patches and updates.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
XSS in public-facing web app directly enables exploitation of the application (T1190) and can turn the site into a vector for drive-by compromise of visitors (T1189).
NVD Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Farktor Software E-Commerce Services Inc. E-Commerce Package allows Cross-Site Scripting (XSS).This issue affects E-Commerce Package: through 27112025.
Deeper analysisAI
CVE-2025-13002 is an Improper Neutralization of Input During Web Page Generation vulnerability that enables Cross-Site Scripting (XSS), mapped to CWE-79. It affects the E-Commerce Package developed by Farktor Software E-Commerce Services Inc., with the issue present in versions through 27112025.
The vulnerability carries a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H), indicating it can be exploited remotely over the network with low attack complexity, no required privileges, and no user interaction. Attackers can achieve low integrity impact alongside high availability impact in an unchanged scope.
Mitigation guidance is available in the advisory from USOM at https://www.usom.gov.tr/bildirim/tr-26-0063.
Details
- CWE(s)