Miggo Logo

CVE-2023-38490: XML External Entity (XXE) vulnerability in the XML data handler

6.8

CVSS Score
3.1

Basic Information

EPSS Score
0.9413%
Published
7/28/2023
Updated
11/5/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
getkirby/cmscomposer< 3.5.8.33.5.8.3
getkirby/cmscomposer>= 3.6.0, < 3.6.6.33.6.6.3
getkirby/cmscomposer>= 3.7.0, < 3.7.5.23.7.5.2
getkirby/cmscomposer>= 3.8.0, < 3.8.4.13.8.4.1
getkirby/cmscomposer>= 3.9.0, < 3.9.63.9.6

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the use of LIBXML_NOENT in Xml::parse(), explicitly shown in the commit diff where this constant was removed to fix XXE. Data::decode() with 'xml' handler is directly mentioned in advisories as an affected code path. Both functions process XML input and were patched by removing the vulnerable LIBXML_NOENT flag, confirming their role in the vulnerability.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### TL;*R T*is vuln*r**ility only *****ts Kir*y sit*s t**t us* t** `Xml` **t* **n*l*r (*.*. `**t*::***o**($strin*, 'xml')`) or t** `Xml::p*rs*()` m*t*o* in sit* or plu*in *o**. T** Kir*y *or* *o*s not us* *ny o* t** *****t** m*t*o*s. I* you us* *n

Reasoning

T** vuln*r**ility st*ms *rom t** us* o* LI*XML_NO*NT in Xml::p*rs*(), *xpli*itly s*own in t** *ommit *i** w**r* t*is *onst*nt w*s r*mov** to *ix XX*. **t*::***o**() wit* 'xml' **n*l*r is *ir**tly m*ntion** in **visori*s *s *n *****t** *o** p*t*. *ot*