CVE-2023-2614: Pimcore Cross-site Scripting (XSS) in name field of Custom Reports
5.4
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.00077%
CWE
-
Published
5/10/2023
Updated
5/10/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| pimcore/pimcore | composer | < 10.5.21 | 10.5.21 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from missing input validation in PHP controller actions (add/clone/update) and insufficient output encoding in the JavaScript deleteField function. The patch adds regex validation (isValidConfigName) to restrict the 'name' field to safe characters and implements proper HTML encoding/decoding in the JS confirmation dialog. The absence of these mitigations in the original code made the listed functions vulnerable to XSS via malicious report names.