CVE-2024-24807: Sulu HTML Injection via Autocomplete Suggestion
4.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.73692%
CWE
Published
2/5/2024
Updated
2/5/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| sulu/sulu | composer | >= 2.0.0, < 2.4.16 | 2.4.16 |
| sulu/sulu | composer | >= 2.5.0, < 2.5.12 | 2.5.12 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the combination of: 1) User-controlled input (tag names) being directly inserted into HTML via replaceAll, and 2) Use of React's dangerouslySetInnerHTML which bypasses XSS protections. The patch replaces this dangerous pattern with safe React element composition. The pre-patch code clearly shows the vulnerable pattern in the highlightedText generation and rendering logic.