-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stemmed from improper sanitization of user-controlled 'custom_notes' content. The patch replaced Parsedown with League\CommonMark (which strips HTML by default) and introduced a Markdown::cleanCustomNotes sanitization layer. The original implementation used Parsedown's line() method via callParsedown, which doesn't strip HTML by default. The Twig template rendered user input with |raw filter combined with Parsedown processing, creating an XSS vector. The vulnerable functions directly handled markdown rendering without adequate security controls prior to the patch.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| froxlor/froxlor | composer | < 2.1.0-dev1 | 2.1.0-dev1 |
KEV Misses 88% of Exploited CVEs- Get the report