
Cloud Vulnerability DB
A community-led vulnerabilities database
A stored Cross-site Scripting (XSS) vulnerability was discovered in pimcore/pimcore version 10.5.19, specifically in the Conditions tab of Pricing Rules. The vulnerability was identified in the From and To fields of the Date Range section. The issue has been fixed in version 10.5.21 (NVD).
The vulnerability exists in the Date Range section's From and To fields within the Conditions tab of Pricing Rules. It allows attackers to inject malicious scripts through these date input fields. The vulnerability has been assigned a CVSS v3.1 Base Score of 4.8 (MEDIUM) with the vector string CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N, indicating that it requires high privileges and user interaction for exploitation (NVD).
If exploited, this vulnerability could lead to the execution of arbitrary JavaScript code in the context of the user's browser. This could potentially result in cookie theft or user redirection to malicious websites (NVD).
The vulnerability has been patched in pimcore/pimcore version 10.5.21. Users are advised to upgrade to this version or later to address the security issue. The fix includes input validation to prevent XSS attacks through the date fields (Github Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."