logo

CVE-2020-11056 barrelstrength/sprout-forms

Package

Manager: composer
Name: barrelstrength/sprout-forms
Vulnerable Version: >=0 <3.9.0

Severity

Level: Critical

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L

EPSS: 0.00557 pctl0.67201

Details

Potential Code Injection in Sprout Forms ### Impact A potential Server-Side Template Injection vulnerability exists in Sprout Forms which could lead to the execution of Twig code. ### Patches The problem is fixed in`barrelstrength/sprout-forms:v3.9.0` which upgrades to `barrelstrength/sprout-base-email:v1.2.7` ### Workarounds Users unable to upgrade should update any Notification Emails to use the "Basic Notification (Sprout Email)" template and avoid using the "Basic Notification (Sprout Forms)" template or any custom templates that display Form Fields. ### References - See the release notes in the [CHANGELOG](https://github.com/barrelstrength/craft-sprout-forms/blob/v3/CHANGELOG.md#390---2020-04-09-critical) - Credits to Paweł Hałdrzyński, Daniel Kalinowski from [ISEC.PL](https://isec.pl/) for discovery and responsible disclosure ### For more information If you have any questions or comments about this advisory: * Open an issue in the [Sprout Forms repo](https://github.com/barrelstrength/craft-sprout-forms/issues) * Email us at [sprout@barrelstrengthdesign.com](mailto:sprout@barrelstrengthdesign.com)

Metadata

Created: 2020-05-08T21:00:02Z
Modified: 2021-10-27T17:00:42Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/05/GHSA-px8v-hxxx-2rgh/GHSA-px8v-hxxx-2rgh.json
CWE IDs: ["CWE-74", "CWE-94"]
Alternative ID: GHSA-px8v-hxxx-2rgh
Finding: F184
Auto approve: 1