CVE-2022-43556: Concrete CMS vulnerable to cross-site scripting in the text input field
4.2
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.78047%
CWE
Published
12/6/2022
Updated
2/1/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| concrete5/concrete5 | composer | < 8.5.10 | 8.5.10 |
| concrete5/concrete5 | composer | >= 9.0.0, < 9.1.3 | 9.1.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from unsanitized output in dashboard breadcrumbs. Release notes explicitly mention 'Sanitized dashboard breadcrumbs to prevent stored XSS' as the fix for CVE-2022-43556. The breadcrumb generation functions in dashboard controllers would be the logical location for this vulnerability, as they handle user-controlled data display. While exact code isn't shown, the pattern matches common XSS vulnerabilities where output encoding was missing in UI components handling user-supplied data.