CVE-2023-2341: Cross-site Scripting (XSS) in Admin Login too many attempts notice
6.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.00252%
CWE
Published
4/27/2023
Updated
11/11/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| pimcore/pimcore | composer | < 10.5.21 | 10.5.21 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the line $params['error'] = $request->get('too_many_attempts') in loginAction, which took untrusted input from the request parameter and passed it to the view without HTML escaping. The patch adds SecurityHelper::convertHtmlSpecialChars() to sanitize this input, confirming the parameter was vulnerable to direct XSS injection. The function's role in handling login error messages makes it the clear injection point.