CVE-2025-62798
PHP vulnerability analysis and mitigation

Overview

A Cross-Site Scripting (XSS) vulnerability (CVE-2025-62798) was discovered in code16/sharp, a content management framework built for Laravel. The vulnerability was found in the SharpShowTextField component when rendering content. The issue was disclosed on October 28, 2025, affecting versions prior to 9.11.1. In affected versions, expressions wrapped in {{ & }} were evaluated by Vue, allowing attackers to inject arbitrary JavaScript or HTML that executes in the browser when the field is displayed (GitHub Advisory).

Technical details

The vulnerability has been assigned a CVSS v3.1 base score of 5.4 (Medium) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N. The root cause was identified in the TextRenderer.vue component, which would take content and directly create a dynamic Vue component from it without proper sanitization. The vulnerability is classified as CWE-79: Improper Neutralization of Input During Web Page Generation (Miggo Analysis, GitHub Advisory).

Impact

The exploitation of this vulnerability could lead to several security implications: theft of user session tokens, unauthorized actions performed on behalf of users, and injection of malicious content into the admin panel. Attackers who can control content rendered through SharpShowTextField could execute arbitrary JavaScript in the context of an authenticated user's browser (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in version 9.11.1 of the code16/sharp package. The fix includes the introduction of a sanitization function, sanitizeForVue, within TemplateRenderer.vue that escapes the {{ and }} sequences, preventing Vue from interpreting them as expressions. For those unable to update immediately, it is recommended to sanitize or encode any user-provided data that may include ({{ & }}) before displaying it in a SharpShowTextField (GitHub Advisory, Miggo Analysis).

Additional resources


SourceThis report was generated using AI

Related PHP vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-62399HIGH7.5
  • PHPPHP
  • moodle/moodle
NoYesOct 23, 2025
CVE-2025-62796MEDIUM5.8
  • PHPPHP
  • privatebin/privatebin
NoYesOct 28, 2025
CVE-2025-62798MEDIUM5.4
  • PHPPHP
  • code16/sharp
NoYesOct 28, 2025
CVE-2025-62401MEDIUM5.4
  • PHPPHP
  • moodle
NoYesOct 23, 2025
CVE-2025-62400MEDIUM4.3
  • PHPPHP
  • moodle
NoYesOct 23, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management