First published: Thu Apr 27 2023(Updated: )
### Impact This vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites. ### Patches Update to version 10.5.21 or apply this patch manually https://github.com/pimcore/pimcore/commit/e88fa79de7b5903fb58ddbc231130b04d937d79e.patch ### Workarounds Apply patch https://github.com/pimcore/pimcore/commit/e88fa79de7b5903fb58ddbc231130b04d937d79e.patch manually. ### References https://huntr.dev/bounties/41edf190-f6bf-4a29-a237-7ff1b2d048d3/
Credit: security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Pimcore Pimcore | <10.5.21 | |
composer/pimcore/pimcore | <10.5.21 | 10.5.21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2323 is a vulnerability that allows for stored cross-site scripting (XSS) attacks in the GitHub repository pimcore/pimcore prior to version 10.5.21.
CVE-2023-2323 has a severity score of 5.4, which is classified as medium.
CVE-2023-2323 affects Pimcore Pimcore versions prior to 10.5.21 and allows for stored cross-site scripting (XSS) attacks.
To fix CVE-2023-2323, update your Pimcore Pimcore installation to version 10.5.21 or later.
You can find more information about CVE-2023-2323 in the GitHub repository pimcore/pimcore and on the huntr.dev page for this vulnerability.