-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from unescaped output of user-controlled data in multiple template files. The commit patching this issue systematically adds HTML escaping (via |escape and Purifier::encodeHtml) to template variables populated by methods like getUrl(), getValueForEditView(), and getDisplayValue(). These methods return data from the WidgetsManagement module that could contain attacker-controlled payloads. The absence of output encoding in the original code allowed stored XSS when malicious content was rendered in dashboard widgets.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| yetiforce/yetiforce-crm | composer | <= 6.4.0 |
KEV Misses 88% of Exploited CVEs- Get the report