CVE-2025-32427: Formie has XSS vulnerability for importing forms
5.3
CVSS Score
4.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.22174%
CWE
Published
4/11/2025
Updated
4/11/2025
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| verbb/formie | composer | <= 2.1.43 | 2.1.44 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability description states that when importing a form from JSON, if the field label or handle contained malicious content, the output wasn't correctly escaped when viewing a preview. The provided commit a64072709e17637c5d2972577030bf9d9981420d directly addresses this. The changes in src/controllers/ImportExportController.php within the actionImportConfigure method show that Html::encode was added to the $field['label'] and $field['handle'] before they are outputted using $this->stdout. This clearly indicates that the actionImportConfigure method was the point where the unescaped data was being handled and outputted, making it the vulnerable function.