First published: Fri Dec 09 2022(Updated: )
Some fields like Message Category (requires I18N enabled) in Model Generator, CRUD Generator or Form Generator, Author Name in Extension Generator, etc. are being cached without sanitisation of their contents when the Preview button is pressed. This leads to possibility of injecting malicious javascript in specified pages by placing it in said fields and caching it by pressing Preview button. On each consequent visit of specified pages malicious javascript will be loaded from server and executed in client's browser.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Yii Framework Gii | <=2.2.4 | |
composer/yiisoft/yii2-gii | <=2.2.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-34297 is a vulnerability in Yii Yii2 Gii through 2.2.4 that allows stored XSS by injecting a payload into any field.
CVE-2022-34297 has a severity rating of medium with a value of 5.4.
The affected software version for CVE-2022-34297 is Yii Yii2 Gii up to and including version 2.2.4.
The CWE ID for CVE-2022-34297 is CWE-79.
To fix CVE-2022-34297, update Yii Yii2 Gii to version 2.2.5 or higher.