GHSA-jw6x-4h8h-569x

Suggest an improvement
Source
https://github.com/advisories/GHSA-jw6x-4h8h-569x
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/12/GHSA-jw6x-4h8h-569x/GHSA-jw6x-4h8h-569x.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-jw6x-4h8h-569x
Aliases
Published
2022-12-15T21:30:26Z
Modified
2023-11-08T04:10:51.123573Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
Roots Soil plugin vulnerable to Cross-site Scripting
Details

A vulnerability, which was classified as problematic, was found in Roots soil Plugin up to 4.1.0. Affected is the function language_attributes of the file src/Modules/CleanUpModule.php. The manipulation of the argument language leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 4.1.1 is able to address this issue. The name of the patch is 0c9151e00ab047da253e5cdbfccb204dd423269d. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-215904.

Database specific
{
    "nvd_published_at": "2022-12-15T21:15:00Z",
    "github_reviewed_at": "2022-12-15T23:28:07Z",
    "severity": "MODERATE",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-79"
    ]
}
References

Affected packages

Packagist / roots/soil

Package

Name
roots/soil
Purl
pkg:composer/roots/soil

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.1.0

Affected versions

3.*

3.0.0
3.0.1
3.0.2
3.0.3
3.1.0
3.2.0
3.3.0
3.4.0
3.5.0
3.6.0
3.6.1
3.6.2
3.7.0
3.7.1
3.7.2
3.7.3
3.8.0
3.8.1
3.9.0

4.*

4.0.0
4.0.1
4.0.2
4.0.3
4.0.4
4.0.5