Miggo Logo

GHSA-r7pm-mw8g-p7px: Ibexa eZ Platform Admin UI XSS vulnerabilities in back office

N/A

CVSS Score

Basic Information

CVE ID
-
EPSS Score
-
Published
6/13/2025
Updated
6/13/2025
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
ezsystems/ezplatform-admin-uicomposer>= 2.3.0-beta1, < 2.3.382.3.38

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability (GHSA-r7pm-mw8g-p7px) is a set of Cross-Site Scripting (XSS) issues in the Ibexa eZ Platform Admin UI. The provided patch (commit acaa620d4ef44e7c20908dc389d48064f2c19e6d) addresses these by ensuring that user-supplied data, specifically content type names (checkbox.dataset.name) and user names (user.TranslatedName), are properly escaped before being rendered as HTML content or HTML attributes.

The root cause was the direct use of potentially tainted data in HTML construction or via innerHTML assignments without prior sanitization. For example, in admin.search.filters.js and admin.trash.list.js, the createUsersListItem functions would construct HTML strings by concatenating user.TranslatedName directly. If an attacker could control this name (e.g., by editing a user profile with a malicious name), they could inject scripts. Similarly, filterByContentType used checkbox.dataset.name without escaping.

The functions filterByContentType, createUsersListItem, and showUsersList in both admin.search.filters.js and admin.trash.list.js were identified as vulnerable because they were involved in processing and rendering this data. The patch modifies these functions to use new helper functions (eZ.helpers.text.escapeHTML, eZ.helpers.text.escapeHTMLAttribute) to sanitize the data before it's incorporated into the DOM. The introduction of eZ.helpers.dom.dangerouslySetInnerHTML is a wrapper, and the security comes from sanitizing the input before calling it. These functions would appear in a runtime profile during the actions that trigger these UI components (e.g., searching, listing items in trash) if the XSS payload was triggered.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t T*is s**urity **visory is * p*rt o* I**X*-S*-****-***, w*i** r*solv*s XSS vuln*r**iliti*s in s*v*r*l p*rts o* t** ***k o**i** o* I**x* *XP. ***k o**i** ****ss *n* v*ryin* l*v*ls o* **itin* *n* m*n***m*nt p*rmissions *r* r*quir** to *xploit

Reasoning

T** vuln*r**ility (**S*-r*pm-mw**-p*px) is * s*t o* *ross-Sit* S*riptin* (XSS) issu*s in t** I**x* *Z Pl*t*orm **min UI. T** provi*** p*t** (*ommit ****************************************) ***r*ss*s t**s* *y *nsurin* t**t us*r-suppli** **t*, sp**i*i