-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from improper output encoding in the JavaScript block where the $type variable was directly printed without context-aware escaping. The patch added htmlentities() to sanitize the output and removed dangerous characters via str_replace(), confirming the original code's insufficient neutralization. The file/module handling user-supplied 'type' parameter was identified as the injection point through the commit diff analysis.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| microweber/microweber | composer | < 1.2.20 | 1.2.20 |