Miggo Logo

GHSA-5r6x-g6jv-4v87: Ibexa Admin UI XSS vulnerabilities in back office

N/A

CVSS Score

Basic Information

CVE ID
-
EPSS Score
-
Published
6/13/2025
Updated
6/13/2025
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
ibexa/admin-uicomposer>= 4.6.0-beta1, < 4.6.214.6.21

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability lies in multiple JavaScript components within the Ibexa Admin UI's back office where user-controllable data (such as item names, labels, search terms, content metadata) was incorporated into HTML strings or directly manipulated in the DOM without proper sanitization. This occurred typically through direct string concatenation into templates, direct assignment to innerHTML, or usage of insertAdjacentHTML with unescaped content. An attacker with sufficient permissions (e.g., Editor, Administrator) could inject malicious scripts (XSS) by crafting input that would then be rendered by these vulnerable functions. The injected XSS could be persistent and potentially affect front-office users.

The patches address these issues by consistently applying HTML escaping functions (e.g., escapeHTML for general content, escapeHTMLAttribute for attribute values) to sanitize the data before it's used in HTML contexts. Additionally, helper functions like dangerouslyInsertAdjacentHTML, dangerouslySetInnerHTML, and dangerouslyAppend are employed. These functions, when used correctly, signal that the input string is already sanitized or is intentionally HTML, thus making the code's intent clearer and safer when combined with prior escaping of dynamic data.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t T*is s**urity **visory is * p*rt o* I**X*-S*-****-***, w*i** r*solv*s XSS vuln*r**iliti*s in s*v*r*l p*rts o* t** ***k o**i** o* I**x* *XP. ***k o**i** ****ss *n* v*ryin* l*v*ls o* **itin* *n* m*n***m*nt p*rmissions *r* r*quir** to *xploit

Reasoning

T** vuln*r**ility li*s in multipl* J*v*S*ript *ompon*nts wit*in t** I**x* **min UI's ***k o**i** w**r* us*r-*ontroll**l* **t* (su** *s it*m n*m*s, l***ls, s**r** t*rms, *ont*nt m*t***t*) w*s in*orpor*t** into *TML strin*s or *ir**tly m*nipul*t** in t