
Cloud Vulnerability DB
A community-led vulnerabilities database
A critical Cross-Site Scripting (XSS) vulnerability was discovered in ezplatform-admin-ui affecting versions >= 2.3.0 and < 2.3.26. The vulnerability (GHSA-58h5-h554-429q) was disclosed on November 10, 2022, and allows for JavaScript injection in the content type entries 'name' and 'short name' fields (GitHub Advisory, Ibexa Advisory).
The vulnerability allows malicious actors to inject JavaScript code through the content type entries specifically in the 'name' and 'short name' fields. The issue was patched in version 2.3.26 by implementing proper escaping of injected content (GitHub Advisory).
The vulnerability could allow attackers with content type editing permissions to execute arbitrary JavaScript code in the context of other users' browsers who access the affected content types. While the impact is significant, it is somewhat limited by the requirement of having content type editing permissions (Ibexa Advisory).
The vulnerability has been fixed in version 2.3.26 of ezplatform-admin-ui. Organizations should upgrade to this version or later to receive the security fix. The patch ensures that any injected content is properly escaped (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."