GHSA-vgm8-r9gm-fw59

Suggest an improvement
Source
https://github.com/advisories/GHSA-vgm8-r9gm-fw59
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/06/GHSA-vgm8-r9gm-fw59/GHSA-vgm8-r9gm-fw59.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-vgm8-r9gm-fw59
Published
2024-06-03T19:41:40Z
Modified
2024-11-30T05:37:55.231148Z
Summary
TYPO3 Cross-Site Scripting in legacy form component
Details

Failing to sanitize content from editors, the legacy form component is susceptible to Cross-Site Scripting. A valid editor account with access to a form content element is required to exploit this vulnerability.

Database specific
{
    "nvd_published_at": null,
    "cwe_ids": [],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2024-06-03T19:41:40Z"
}
References

Affected packages

Packagist / typo3/cms

Package

Name
typo3/cms
Purl
pkg:composer/typo3/cms

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.2.18

Affected versions

6.*

6.2.0
6.2.1
6.2.2
6.2.3
6.2.4
6.2.5
6.2.6
6.2.7
6.2.8
6.2.9
6.2.10-rc1
6.2.10
6.2.11
6.2.12
6.2.13
6.2.14
6.2.15
6.2.16
6.2.17