
Cloud Vulnerability DB
A community-led vulnerabilities database
A cross-site scripting (XSS) vulnerability was discovered in vova07 Yii2 FileAPI Widget versions up to 0.1.8. The vulnerability affects the run function in the actions/UploadAction.php file, where improper handling of the file argument could lead to XSS attacks (NVD).
The vulnerability is classified as CWE-79 (Cross-site Scripting) and has been assigned a CVSS v3.1 score with the following metrics: AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N. The issue specifically exists in the run function of actions/UploadAction.php where user input from the file argument was not properly encoded before being reflected back to users (GitHub Commit).
The vulnerability allows attackers to execute cross-site scripting attacks when manipulating the file argument, potentially leading to the injection of malicious scripts that could affect users interacting with the application (NVD).
The vulnerability has been fixed in version 0.1.9 of the Yii2 FileAPI Widget. The fix involves properly encoding the error message using Html::encode() function. The patch can be identified by the commit hash c00d1e4fc912257fca1fce66d7a163bdbb4c8222 (GitHub Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."