CVE-2022-38080: exceedone/exment and exceedone/laravel-admin Cross-site Scripting vulnerability
5.4
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.58014%
CWE
Published
8/25/2022
Updated
1/27/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| exceedone/exment | composer | >= 5.0.0, < 5.0.3 | 5.0.3 |
| exceedone/exment | composer | < 4.4.3 | 4.4.3 |
| exceedone/laravel-admin | composer | < 2.2.3 | 2.2.3 |
| exceedone/laravel-admin | composer | = 3.0.0 | 3.0.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
Reflected XSS typically involves echoing unvalidated request parameters in responses. Both packages' authentication flows are prime candidates as they handle redirect parameters and error messages. The vulnerability requires authenticated access, aligning with login/redirect functionality. While no direct code is available, Laravel-admin's known use of {!! !!} raw output directives in Blade templates for redirect URLs (common in auth flows) and Exment's extension of these components suggests these entry points. Confidence is medium due to pattern-matching rather than direct code analysis.