The X-October-Request-Handler Header does not sanitize the AJAX handler name and allows unescaped HTML to be reflected back. There is no impact since this vulnerability cannot be exploited through normal browser interactions. This unescaped value is only detectable when using a proxy interception tool.
This issue has been patched in v3.5.15.
Credits to: - Mayank Mehra
If you have any questions or comments about this advisory: * Email us at hello@octobercms.com
{ "nvd_published_at": "2024-06-26T16:15:10Z", "cwe_ids": [ "CWE-79" ], "severity": "LOW", "github_reviewed": true, "github_reviewed_at": "2024-06-26T14:08:31Z" }