CVE-2024-53864: Ibexa Admin UI vulnerable to Cross-site Scripting in a field that is used in the Content name pattern
5.3
CVSS Score
4.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.45842%
CWE
Published
12/2/2024
Updated
12/2/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| ibexa/admin-ui | composer | >= 4.6.0, < 4.6.14 | 4.6.14 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from unsafe HTML injection via innerHTML in the getTextHeight function. The GitHub commit 8ec824a explicitly fixes this by changing innerHTML to innerText in tooltips.helper.js. This file is part of the content naming mechanism, and the CWE-79 classification confirms this is an XSS vulnerability caused by improper input neutralization during web page generation.