CVE-2023-2343: Cross-site Scripting (XSS) in DataObject Classification Store
5.4
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.00013%
CWE
Published
4/27/2023
Updated
11/11/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| pimcore/pimcore | composer | < 10.5.21 | 10.5.21 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from missing input sanitization in both backend PHP controllers and frontend JavaScript handlers. The patch adds SecurityHelper::getStringWithoutControlChars in PHP and equivalent JS sanitization, indicating the original functions lacked proper neutralization of special characters in user-controlled 'name' parameters. The affected functions directly process() user input that gets reflected in admin UI elements like confirmation dialogs and store/group names, creating XSS vectors when malicious payloads are injected.