formwork Cross-site scripting vulnerability in Markdown fields
Moderate severity
GitHub Reviewed
Published
May 25, 2024
in
getformwork/formwork
•
Updated Jun 10, 2024
Description
Published by the National Vulnerability Database
May 28, 2024
Published to the GitHub Advisory Database
May 28, 2024
Reviewed
May 28, 2024
Last updated
Jun 10, 2024
Impact
Users with access to the administration panel with page editing permissions could insert
<script>
tags in markdown fields, which are exposed on the publicly accessible site pages, leading to potential XSS injections.Patches
content.safe_mode
(enabled by default) controls whether HTML tags and potentially dangerous links are escaped. This is configurable as in some cases more flexibility should be given. Panel users should be only a controlled group of editors, which cannot enable the option by themselves, and not a generic group. This mitigates the chance of introducing vulnerabilities.content.safeMode
system option. Like Formwork 1.13.0, by default HTML tags and dangerous link are escaped. Even if enabled by an administrator, however,<script>
and other dangerous tags are still converted to text, but secure tags are allowed.References
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35621
References