Sylius Fixes Critical XSS Vulnerability in Admin Panel
CVE-2024-34349
4.8MEDIUM
Key Information
- Vendor
- Sylius
- Status
- Sylius
- Vendor
- CVE Published:
- 14 May 2024
Summary
Sylius is an open source eCommerce platform. Prior to 1.12.16 and 1.13.1, there is a possibility to execute javascript code in the Admin panel. In order to perform an XSS attack input a script into Name field in which of the resources: Taxons, Products, Product Options or Product Variants. The code will be executed while using an autocomplete field with one of the listed entities in the Admin Panel. Also for the taxons in the category tree on the product form.The issue is fixed in versions: 1.12.16, 1.13.1.
Affected Version(s)
Sylius < 1.12.16
Sylius < 1.13.0-alpha.1, 1.13.1
CVSS V3.1
Score:
4.8
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
Required
Scope:
Changed
Timeline
Risk change from: 6.1 to: 4.8 - (MEDIUM)
Vulnerability published.
Vulnerability Reserved.
Collectors
NVD DatabaseMitre Database