CVE-2023-3552:
TeamPass vulnerable to Improper Encoding or Escaping of Output
7.6
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.46388%
CWE
Published
7/8/2023
Updated
11/10/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
nilsteampassnet/teampass | composer | < 3.0.10 | 3.0.10 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The key vulnerability stemmed from the processing order in simplePurifier. The original implementation decoded HTML entities before sanitization with DOMPurify, creating an XSS bypass opportunity. The patch swapped these steps (DOMPurify first, then entity decoding), which is the correct security-critical sequence. The commit message explicitly references fixing XSS in folder pages, and the functions.js modification directly addresses the output encoding flaw described in CWE-116.