CVE-2022-4524 – roots/soil
Package
Manager: composer
Name: roots/soil
Vulnerable Version: >=0 <4.1.0
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00076 pctl0.23423
Details
Roots Soil plugin vulnerable to Cross-site Scripting A vulnerability, which was classified as problematic, was found in Roots soil Plugin up to 4.1.0. Affected is the function language_attributes of the file src/Modules/CleanUpModule.php. The manipulation of the argument language leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 4.1.1 is able to address this issue. The name of the patch is 0c9151e00ab047da253e5cdbfccb204dd423269d. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-215904.
Metadata
Created: 2022-12-15T21:30:26Z
Modified: 2022-12-21T16:12:56Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/12/GHSA-jw6x-4h8h-569x/GHSA-jw6x-4h8h-569x.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-jw6x-4h8h-569x
Finding: F425
Auto approve: 1