CVE-2020-24912: qcubed reflected cross-site scripting (XSS) vulnerability
6.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.95381%
CWE
Published
5/24/2022
Updated
4/24/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| qcubed/qcubed | composer | <= 3.1.1 | 3.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability occurs in profile.php where the stQuery parameter is part of serialized POST data. The code unserializes/base64-decodes user input and directly outputs the strQuery value using _p($strQuery, false). The second parameter 'false' in _p() likely disables HTML escaping, allowing injected scripts to execute. The GitHub patch shows the vulnerability was mitigated by adding proper escaping and hardening input handling in this file.