CVE-2017-20061: Cross site scripting in Elefant CMS
5.4
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.40736%
CWE
Published
6/21/2022
Updated
1/27/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
elefant/cms | composer | < 1.3.13 | 1.3.13 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability manifests in the /admin/extended endpoint's handling of the 'name' parameter. The PoC shows a direct injection via URL parameters (%3Cimg... payload), indicating the input is reflected unsanitized. In Elefant CMS's MVC structure, this would correspond to a handler method (like Extended::index
) responsible for processing the request. The lack of output encoding for the 'name' parameter before rendering it in the admin interface is the root cause. While the exact function name isn't explicitly disclosed, the endpoint and parameter correlation strongly implicate the request handler for this route.