Description
The Ibexa Admin UI Bundle contains all the necessary parts to run the Ibexa DXP Back Office interface. The file upload widget is vulnerable to XSS payloads in filenames. Access permission to upload files is required. As such, in most cases only authenticated editors and administrators will have the required permission. It is not persistent, i.e. the payload is only executed during the upload. In effect, an attacker will have to trick an editor/administrator into uploading a strangely named file.
References (5)
Core 5
Core References
Vendor Advisory x_refsource_confirm
https://github.com/ibexa/admin-ui/security/advisories/GHSA-qm44-wjm2-pr59
Vendor Advisory x_refsource_misc
https://github.com/ezsystems/ezplatform-admin-ui/security/advisories/GHSA-gc5h-6jx9-q2qh
Patch x_refsource_misc
https://github.com/ezsystems/ezplatform-admin-ui/commit/7a9f991b200fa5a03d49cd07f50577c8bc90a30b
Patch x_refsource_misc
https://github.com/ibexa/admin-ui/commit/8dc413fad1045fcfbe65dbcb0bea8516accc4c3e
Various Sources x_refsource_misc
https://developers.ibexa.co/security-advisories/ibexa-sa-2024-004-dom-based-xss-in-file-upload
Scores
CVSS v3
5.4
EPSS
0.0010
EPSS Percentile
27.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-79
Status
published
Products (2)
ibexa/admin-ui
4.6.0-beta1 - 4.6.9Packagist
ibexa/admin-ui
>= 4.6.0-beta1, < 4.6.9
Published
Jul 31, 2024
Tracked Since
Feb 18, 2026