CVE-2023-2332:
Cross-site Scripting (XSS) in Conditions tab of Pricing Rules
4
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
4/27/2023
Updated
11/15/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
pimcore/pimcore | composer | < 10.5.21 | 10.5.21 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The XSS vulnerability stemmed from insufficient input sanitization in date field handlers within the Pricing Rules' Conditions tab. The patch added client-side validation using Ext.String.hasHtmlCharacters in onChange handlers, which indicates the vulnerability existed in the datefield components' input handling. The PHP DateRange changes address null handling but aren't directly XSS-related. The primary vulnerable code was the JavaScript datefield configuration that lacked input sanitization before rendering.