-
CVSS Score
-A Semantic Attack on Google Gemini - Read the Latest Research
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| wallabag/wallabag | composer | >= 2.2.3, < 2.3.3 | 2.3.3 |
The vulnerability stems from improper input sanitization in the configuration page's form handling. The attack requires setting a malicious payload in the Piwik URL parameter, which is processed by these controller actions. The functions directly handle user input without sufficient escaping, allowing the payload to be stored and executed when rendered. The Bishop Fox blog explicitly identifies the parameter and exploitation flow, implicating these backend handlers. The Symfony/CraueConfigBundle architecture further supports this conclusion, as these controllers are standard entry points for configuration management.