CVE-2020-26768: Formstone Vulnerable to Reflected XSS
6.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.67644%
CWE
Published
5/24/2022
Updated
4/1/2024
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
formstone | npm | <= 1.4.16 | 1.4.17 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from procedural code in upload-target.php and upload-chunked.php that directly outputs user-controlled input (from $_POST and $_FILES) without proper sanitization. While the commit diff shows the introduction of a sanitize() function in the patched version, the vulnerable versions (<=1.4.16) lacked this protection. The insecure code exists in the global scope of these PHP scripts rather than within specific named functions, making it impossible to identify discrete vulnerable functions with high confidence.