-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| snipe/snipe-it | composer | < 4.6.14 | 4.6.14 |
The vulnerability description explicitly mentions both log_meta values and user last name in the API as XSS vectors. The GitHub pull request shows commits specifically addressing escaping in these two areas ('Properly escape log_meta values' and 'Escape user's last name in API'). The pattern matches classic XSS vulnerabilities where user-controlled data is rendered without proper output encoding. While exact file paths aren't visible in provided data, the controller/API handling patterns in Laravel applications strongly suggest these locations.