Описание
ibexa/fieldtype-richtext has an XSS vulnerability via acronym custom tag in Rich Text
Impact
This security advisory resolves an XSS vulnerability in acronym custom tag in Rich Text, in the back office of the DXP. Back office access and varying levels of editing and management permissions are required to exploit this vulnerability. This typically means Editor or Administrator role, or similar. Injected XSS is persistent and may in some cases be reflected in the front office, possibly affecting end users. The fixes ensure XSS is escaped, and any existing injected XSS is rendered harmless.
Patches
See "Patched versions".
Workarounds
None.
References
Пакеты
Наименование
ibexa/fieldtype-richtext
composer
Затронутые версииВерсия исправления
>= 5.0.0, < 5.0.3
5.0.3
Наименование
ibexa/fieldtype-richtext
composer
Затронутые версииВерсия исправления
>= 4.6.0, < 4.6.25
4.6.25
4.8 Medium
CVSS4
Дефекты
CWE-79
4.8 Medium
CVSS4
Дефекты
CWE-79