### [CVE-2020-6200](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6200) ![](https://img.shields.io/static/v1?label=Product&message=SAP%20Commerce%20Cloud%20(SmartEdit%20Extension)&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3C6.6%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Cross-Site-Scripting&color=brighgreen) ### Description The SAP Commerce (SmartEdit Extension), versions- 6.6, 6.7, 1808, 1811, is vulnerable to client-side angularjs template injection, a variant of Cross-Site-Scripting (XSS) that exploits the templating facilities of the angular framework. ### POC #### Reference - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305 #### Github No PoCs found on GitHub currently.