CVE-2022-32173: OrchardCore vulnerable to HTML injection
5.4
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.42336%
CWE
Published
10/4/2022
Updated
1/27/2023
KEV Status
No
Technology
C#
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| OrchardCore | nuget | >= 1.0.0-rc1-11259, < 1.4.0 | 1.4.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from incomplete HTML sanitization in the ConfigureHtmlSanitizer configuration. The patch explicitly removes the 'form' tag from AllowedTags (sanitizer.AllowedTags.Remove("form")), indicating this was the attack vector. The AddHtmlSanitizer method in OrchardCoreBuilderExtensions.cs is responsible for configuring the sanitizer's allow-list, making it the root of the vulnerability. The presence of 'form' in allowed tags prior to v1.4.0 allowed attackers to inject modal dialogs with form elements, as demonstrated in the PoC.