CVE-2023-30838: Possible XSS injection through Validate::isCleanHTML method
8.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.65739%
CWE
Published
4/25/2023
Updated
11/10/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
prestashop/prestashop | composer | >= 8.0.0, < 8.0.4 | 8.0.4 |
prestashop/prestashop | composer | < 1.7.8.9 | 1.7.8.9 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems directly from the Validate::isCleanHtml
method's incomplete event handler validation. The commit diff explicitly shows the addition of animation-related events (onanimationcancel, onanimationend, etc.) to the regex pattern, indicating these were previously missing. Since this function
is responsible for sanitizing HTML input, the omission of these events allowed XSS payloads to bypass validation. The CVE description and patch context confirm this function
was the attack vector.