First published: Wed May 15 2024(Updated: )
This security advisory fixes a vulnerability in eZ Publish Legacy, and we recommend that you install it as soon as possible if you are using Legacy via the LegacyBridge. Installations where all modules are disabled may be vulnerable to XSS injection in the module name. This is a rare configuration, but we still recommend installing the update, which adds the necessary input washing. To install, use Composer to update to one of the "Resolving versions" mentioned above, or apply this patch manually: https://github.com/ezsystems/ezpublish-legacy/commit/4697bff700e8cf95d5847ea19dad3479a77b02d9
Affected Software | Affected Version | How to fix |
---|---|---|
composer/ezsystems/ezpublish-legacy | >=5.3.0<5.3.12.5 | 5.3.12.5 |
composer/ezsystems/ezpublish-legacy | >=5.4.0<5.4.12.2 | 5.4.12.2 |
composer/ezsystems/ezpublish-legacy | >=2011.0.0<2017.12.4.2 | 2017.12.4.2 |
composer/ezsystems/ezpublish-legacy | >=2018.6.0<2018.6.1.3 | 2018.6.1.3 |
composer/ezsystems/ezpublish-legacy | >=2018.9.0<2018.9.1.2 | 2018.9.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of GHSA-2vh3-cj9j-mcj5 is classified as critical due to the potential for XSS injection.
To fix GHSA-2vh3-cj9j-mcj5, upgrade to eZ Publish Legacy version 5.3.12.5, 5.4.12.2, 2017.12.4.2, 2018.6.1.3, or 2018.9.1.2.
Users of eZ Publish Legacy with modules disabled via the LegacyBridge are affected by GHSA-2vh3-cj9j-mcj5.
GHSA-2vh3-cj9j-mcj5 describes a Cross-Site Scripting (XSS) vulnerability.
If an immediate upgrade is not possible for GHSA-2vh3-cj9j-mcj5, consider disabling the affected modules until an upgrade can be performed.