CVE-2023-37280: Pimcore admin UI vulnerable to Cross-site Scripting in 2 factor authentication setup page
6.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.01577%
CWE
Published
7/12/2023
Updated
11/7/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| pimcore/admin-ui-classic-bundle | composer | < 1.0.3 | 1.0.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper output encoding in the Twig template. The key evidence is the patch removing the |raw filter from {{ error|trans([],'admin')|raw }}. In Twig, |raw prevents automatic HTML escaping, making this a classic XSS pattern when applied to untrusted input. The error parameter is directly reflected from the URL into the page without sanitization, enabling script injection. The fix confirms this by removing the dangerous raw filter, leaving {{ error|trans([],'admin') }} which enables Twig's default HTML escaping.