CVE-2020-27388:
YOURLS Stored Cross Site Scripting (XSS)
5.4
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
5/24/2022
Updated
1/10/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
yourls/yourls | composer | >= 1.5, < 1.8 | 1.8 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from the plugin header parsing logic in yourls_get_plugin_data() which directly assigned user-controlled input (plugin metadata headers) to display values without HTML escaping. The fix in commit 04495e8 explicitly adds yourls_esc_html() sanitization to the header values, confirming this was the vulnerable code path. The function's role in processing plugin metadata makes it the clear injection point for stored XSS payloads.