Lucene search

K
githubGitHub Advisory DatabaseGHSA-43W4-4J3C-JX29
HistoryDec 28, 2023 - 10:32 p.m.

Winter CMS Stored XSS through Backend ColorPicker FormWidget

2023-12-2822:32:52
CWE-79
GitHub Advisory Database
github.com
12
winter cms
stored xss
backend colorpicker
formwidget
low severity
patched
version 1.2.4
security issue
update
workaround

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

AI Score

5.8

Confidence

High

EPSS

0

Percentile

14.0%

Impact

Users with access to backend forms that include a ColorPicker FormWidget can provide a value that would then be rendered unescaped in the backend form, potentially allowing for a stored XSS attack.

By default, only the Brand Settings (backend.manage_branding) and Mail Brand Settings (system.manage_mail_templates) forms include the colorpicker formwidget, however it is also common for theme’s to include it on their Theme Customization (cms.manage_theme_options) form.

Although this was a security issue, it’s important to note that its severity is relatively low. To exploit the vulnerability, an attacker would already need to have trusted access to the Winter CMS backend and they would then need to convince a user with higher privileges than them to visit an affected Form in the backend.

These two factors limit the potential harm of this vulnerability. That being said, all users are advised to update to the latest version (1.2.4) to ensure their systems remain secure.

Patches

This issue has been patched in v1.2.4.

Workarounds

Apply https://github.com/wintercms/winter/commit/517f65dfae679b57575b047de13c5af48915a5ba manually if unable to upgrade to v1.2.4.

Affected configurations

Vulners
Node
winterwn-backend-moduleRange<1.2.4
VendorProductVersionCPE
winterwn-backend-module*cpe:2.3:a:winter:wn-backend-module:*:*:*:*:*:*:*:*

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

AI Score

5.8

Confidence

High

EPSS

0

Percentile

14.0%

Related for GHSA-43W4-4J3C-JX29