CVE-2023-1789: Firefly III vulnerable to improper input validation
5.9
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.10216%
CWE
Published
4/1/2023
Updated
4/15/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| grumpydictator/firefly-iii | composer | < 6.0.0 | 6.0.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from missing input sanitization in currency handling operations. The patch adds critical security measures: 1) e() function (HTML escaping) for text fields, 2) strict type casting for numeric/boolean fields. The affected functions directly process user-controlled input (currency properties) without these protections in vulnerable versions. The commit's explicit addition of these sanitization steps to these specific functions confirms their vulnerable state prior to 6.0.0.