Pimcore is an open source data and experience management platform. Prior to version 10.5.19, an attacker can use cross-site scripting to send a malicious script to an unsuspecting user. Users may upgrade to version 10.5.19 to receive a patch or, as a workaround, apply the patch manually.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://github.com/pimcore/pimcore/security/advisories/GHSA-x5j3-mq9g-8jc8 | vendor advisory |
https://github.com/pimcore/pimcore/pull/14669.patch | patch mailing list |
https://github.com/pimcore/pimcore/commit/c59d0bf1d03a5037b586fe06230694fa3818dbf2 | patch |
https://huntr.dev/bounties/fa77d780-9b23-404b-8c44-12108881d11a | third party advisory exploit |