
We found results for “”
CVE-2022-23598
Good to know:

Date: January 28, 2022
laminas-form is a package for validating and displaying simple and complex forms. When rendering validation error messages via the `formElementErrors()` view helper shipped with laminas-form, many messages will contain the submitted value. However, in laminas-form prior to version 3.1.1, the value was not being escaped for HTML contexts, which could potentially lead to a reflected cross-site scripting attack. Versions 3.1.1 and above contain a patch to mitigate the vulnerability. A workaround is available. One may manually place code at the top of a view script where one calls the `formElementErrors()` view helper. More information about this workaround is available on the GitHub Security Advisory.
Language: PHP
Severity Score
Related Resources (11)
Severity Score
Weakness Type (CWE)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CWE-79Top Fix

Upgrade Version
Upgrade to version laminas/laminas-form - dev-3.0.x-merge-up-into-3.1.x_HQMm7WVh;laminas/laminas-form - dev-2.17.x-merge-up-into-2.18.x_l7hs9xUs;laminas/laminas-form - dev-renovate/vimeo-psalm-5.x;laminas/laminas-form - no_fix;laminas/laminas-form - dev-3.1.x-merge-up-into-3.2.x_a8l92qxb;laminas/laminas-form - dev-renovate/doctrine-annotations-2.x;laminas/laminas-form - dev-2.15.x-merge-up-into-2.16.x_6051ffed8a47b7.85524711;laminas/laminas-form - 3.0.2;laminas/laminas-form - 2.15.2;matycz/lemo-base - 2.0.1;lgv/cms - no_fix
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | REQUIRED |
Scope (S): | CHANGED |
Confidentiality (C): | LOW |
Integrity (I): | LOW |
Availability (A): | NONE |
CVSS v2
Base Score: |
|
---|---|
Access Vector (AV): | NETWORK |
Access Complexity (AC): | MEDIUM |
Authentication (AU): | NONE |
Confidentiality (C): | NONE |
Integrity (I): | PARTIAL |
Availability (A): | NONE |
Additional information: |