Miggo Logo

CVE-2020-19626: Craft CMS Cross-site Scripting Vulnerability

5.4

CVSS Score
3.1

Basic Information

EPSS Score
0.46023%
Published
5/24/2022
Updated
2/1/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
craftcms/cmscomposer< 3.1.333.1.33

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper output encoding in the Craft CMS admin interface. The commit 76a2168 explicitly shows the addition of the |e (escape) filter to the site.name variable in the _edit.html template. This indicates that the unescaped rendering of site.name in vulnerable versions allowed injection of arbitrary HTML/scripts. As the XSS occurs via user-controlled input in the site creation form (admin/settings/sites/new) and the fix was purely template-level output encoding, the vulnerable code path is clearly identified in this template file.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*ross Sit* S*riptin* (XSS) vuln*r**ility in *r**t*ms *.*.**, *llows r*mot* *tt**k*rs to inj**t *r*itr*ry w** s*ript or *TML, vi* `/**min/s*ttin*s/sit*s/n*w`.

Reasoning

T** vuln*r**ility st*ms *rom improp*r output *n*o*in* in t** *r**t *MS **min int*r****. T** *ommit ******* *xpli*itly s*ows t** ***ition o* t** `|*` (*s**p*) *ilt*r to t** `sit*.n*m*` v*ri**l* in t** `_**it.*tml` t*mpl*t*. T*is in*i**t*s t**t t** un*