CVE-2021-43836:
PHP file inclusion in the Sulu admin panel
8.6
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
12/15/2021
Updated
2/1/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
sulu/sulu | composer | < 1.6.44 | 1.6.44 |
sulu/sulu | composer | >= 2.0.0, < 2.2.18 | 2.2.18 |
sulu/sulu | composer | >= 2.3.0, < 2.3.8 | 2.3.8 |
sulu/sulu | composer | = 2.4.0-RC1 | 2.4.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the ExpressionLanguage evaluator having access to an unrestricted TranslatorInterface. The patch wraps the translator with a security proxy (TranslatorWrapper) that blocks setLocale and implicitly prevents addResource() calls. The test case explicitly shows attempts to exploit translator.addResource() were blocked post-patch. The root cause is the direct exposure of the translator to expression evaluation, which allowed path traversal via file inclusion methods in the Translator component.