CVE-2023-28851 – andrewhaine/silverstripe-form-capture
Package
Manager: composer
Name: andrewhaine/silverstripe-form-capture
Vulnerable Version: >=0.2.0 <1.0.2 || >=2.0.0 <2.2.5 || >=1.0.0 <1.0.2
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00492 pctl0.64664
Details
Silverstripe Form Capture vulnerable to stored cross-site-scripting ### Impact Improper escaping when presenting stored form submissions allowed for an attacker to perform a Cross-Site Scripting attack ### Patches The vulnerability was initially patched in version 1.0.2, and version 1.1.0 includes this patch. The bug was then accidentally re-introduced during a merge error, and has been re-patched in versions 2.2.5 and 3.1.1.
Metadata
Created: 2023-04-03T21:06:31Z
Modified: 2023-04-12T22:31:46Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/04/GHSA-38h6-gmr2-j4wx/GHSA-38h6-gmr2-j4wx.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-38h6-gmr2-j4wx
Finding: F425
Auto approve: 1