CVE-2023-2332: Cross-site Scripting (XSS) in Conditions tab of Pricing Rules
4
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.00016%
CWE
Published
4/27/2023
Updated
11/15/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| pimcore/pimcore | composer | < 10.5.21 | 10.5.21 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The XSS vulnerability stemmed from insufficient input sanitization in date field handlers within the Pricing Rules' Conditions tab. The patch added client-side validation() using Ext.String.hasHtmlCharacters in onChange handlers, which indicates the vulnerability existed in the datefield components' input handling. The PHP DateRange changes address null handling but aren't directly XSS-related. The primary vulnerable code was the JavaScript datefield configuration that lacked input sanitization before rendering.