CVE-2024-47817: Lara-zeus Dynamic Dashboard and Artemis do not validate paragraph widget values which can be used for XSS
6.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.06612%
CWE
Published
10/7/2024
Updated
10/8/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| lara-zeus/dynamic-dashboard | composer | >= 3.0.0, <= 3.0.1 | 3.0.2 |
| lara-zeus/artemis | composer | >= 1.0.0, <= 1.0.6 | 1.0.7 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from unsanitized output in paragraph widget templates. Analysis of the patches shows:
- The fix added strip_tags() sanitization before markdown processing
- The original vulnerable code used {!! $data['content'] !!} directly
- Multiple theme implementations (zeus, breeze, daisy) were patched similarly
- The {!! !!} syntax in Laravel Blade prevents automatic HTML escaping
- CWE-79 classification confirms this is a classic XSS scenario through unvalidated user input in templates