CVE-2023-44381: October CMS safe mode bypass using Page template injection
4.9
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.39294%
CWE
Published
11/29/2023
Updated
12/4/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| october/system | composer | >= 3.0.0, < 3.4.15 | 3.4.15 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper enforcement of cms.safe_mode restrictions when processing CMS templates. Functions handling template rendering (e.g., renderPage) and backend save operations (e.g., onSave) are critical points where user input could bypass safe mode checks. These functions likely lacked proper validation to strip or block PHP code in templates when safe mode was enabled, allowing crafted payloads to execute. The high confidence stems from the CWE-94 context (code injection) and the workflow described in the advisory, where backend users with template editing permissions exploit these functions to inject PHP.