CVE-2024-46998:
baserCMS has a Cross-site Scripting (XSS) Vulnerability in Edit Email Form Settings Feature
7.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.28185%
CWE
Published
10/24/2024
Updated
10/28/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
baserproject/basercms | composer | <= 5.1.1 | 5.1.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability involves stored XSS in the Edit Email Form Settings feature. XSS typically occurs when user input is not sanitized on output. In MVC frameworks like baserCMS (CakePHP-based), controllers handle input processing, and views handle rendering. The edit action in EmailFormSettingsController
likely fails to sanitize input before saving, while the associated view template (edit.ctp
) may lack proper escaping (e.g., using <?= h($field) ?>
). The high confidence in the view template stems from the prevalence of XSS via unescaped output in similar CMS systems. The medium confidence in the controller reflects uncertainty about input validation practices without explicit patch details.