Miggo Logo

GHSA-mw82-6m2g-qh6c: Duplicate Advisory: Sylius Cross Site Scripting (XSS) vulnerability

5.4

CVSS Score
3.1

Basic Information

CVE ID
-
EPSS Score
-
Published
4/22/2024
Updated
5/20/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
sylius/syliuscomposer<= 1.12.13

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The XSS vulnerability manifests in province field rendering, indicating: 1) The form builder doesn't enforce adequate sanitization when processing user input 2) The template layer fails to properly escape the stored province data during output. While exact code isn't available, Sylius' architecture patterns (Symfony forms + Twig templates) and the vulnerability's persistence through storage/retrieval cycle strongly suggest insufficient escaping at both input handling and output rendering stages.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

## *upli**t* **visory T*is **visory **s ***n wit**r*wn ****us* it is * *upli**t* o* **S*-*prj-***r-*r*q. T*is link is m*int*in** to pr*s*rv* *xt*rn*l r***r*n**s. ## Ori*in*l **s*ription Sylius *.**.** is vuln*r**l* to *ross Sit* S*riptin* (XSS) vi*

Reasoning

T** XSS vuln*r**ility m*ni**sts in provin** *i*l* r*n**rin*, in*i**tin*: *) T** *orm *uil**r *o*sn't *n*or** ***qu*t* s*nitiz*tion w**n pro**ssin* us*r input *) T** t*mpl*t* l*y*r **ils to prop*rly *s**p* t** stor** provin** **t* *urin* output. W*il*