
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-23937 affects Pimcore, an Open Source Data & Experience Management Platform. The vulnerability was discovered in the user profile upload functionality where the system fails to properly validate file content-type. This security flaw was patched in version 10.5.16 (Vendor Advisory).
The vulnerability stems from improper validation of file content-type in the user profile upload functionality. Authenticated users can bypass the security check by adding a valid signature (e.g., GIF89) and sending an invalid content-type. The vulnerability has received a CVSS v3.1 base score of 8.2 (HIGH) from GitHub and 5.4 (MEDIUM) from NVD, with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N (NVD).
This vulnerability allows authenticated attackers to upload HTML files containing JavaScript content that can be executed in the context of the domain. This could lead to potential cross-site scripting attacks and unauthorized code execution within the application's domain context (Vendor Advisory).
Users are advised to upgrade to Pimcore version 10.5.16 or later which contains the security patch. Alternatively, users can manually apply the patch available at the GitHub pull request #14125 (Vendor Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."