First published: Thu Apr 27 2023(Updated: )
### Impact This vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites. ### Patches Update to version 10.5.21 or apply this patch manually https://github.com/pimcore/pimcore/commit/fb3056a21d439135480ee299bf1ab646867b5f4f.patch ### Workarounds Apply patch https://github.com/pimcore/pimcore/commit/fb3056a21d439135480ee299bf1ab646867b5f4f.patch manually. ### References https://huntr.dev/bounties/7336b71f-a36f-4ce7-a26d-c8335ac713d6/
Credit: security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Pimcore Pimcore | <10.5.21 | |
composer/pimcore/pimcore | <10.5.21 | 10.5.21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2327 is a Cross-site Scripting (XSS) vulnerability that is stored in the GitHub repository pimcore/pimcore prior to version 10.5.21.
CVE-2023-2327 has a severity of medium with a CVSS score of 5.4.
CVE-2023-2327 affects Pimcore software prior to version 10.5.21, allowing for stored Cross-site Scripting (XSS) attacks.
To fix the CVE-2023-2327 vulnerability, update your Pimcore software to version 10.5.21 or later.
You can find more information about CVE-2023-2327 at the following references: [GitHub Commit](https://github.com/pimcore/pimcore/commit/fb3056a21d439135480ee299bf1ab646867b5f4f) and [Huntr Dev](https://huntr.dev/bounties/7336b71f-a36f-4ce7-a26d-c8335ac713d6).