CVE-2022-0539: Cross-site Scripting in Beanstalk console
6.3
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.49989%
CWE
Published
2/10/2022
Updated
2/3/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
ptrofimov/beanstalk_console | composer | < 1.7.14 | 1.7.14 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from unescaped output in PHP template files. The commit adds htmlspecialchars() to multiple echo statements that output user-controlled values:
- In main.php, server names ($serverItem) were directly embedded in href attributes and link text
- In serversList.php, server labels and parameters ($label, $server) were rendered without sanitization These locations allowed stored XSS via malicious server names/parameters. The patch confirms vulnerability by adding context-appropriate escaping, indicating these were the injection points.