CVE-2023-28851

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-28851
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-28851.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-28851
Aliases
Published
2023-04-03T17:36:22Z
Modified
2025-10-30T20:19:58.357755Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
Silverstripe Form Capture vulnerable to Stored Cross-Site Scripting
Details

Silverstripe Form Capture provides a method to capture simple silverstripe forms and an admin interface for users. Starting in version 0.2.0 and prior to versions 1.0.2, 1.1.0, 2.2.5, and 3.1.1, improper escaping when presenting stored form submissions allowed for an attacker to perform a Cross-Site Scripting attack. The vulnerability was initially patched in version 1.0.2, and version 1.1.0 includes this patch. The bug was then accidentally re-introduced during a merge error, and has been re-patched in versions 2.2.5 and 3.1.1. There are no known workarounds for this vulnerability.

Database specific
{
    "cwe_ids": [
        "CWE-79",
        "CWE-80"
    ]
}
References

Affected packages

Git / github.com/bigfork/silverstripe-form-capture

Affected ranges

Type
GIT
Repo
https://github.com/bigfork/silverstripe-form-capture
Events
Database specific
{
    "versions": [
        {
            "introduced": "0.2.0"
        },
        {
            "fixed": "1.0.2"
        }
    ]
}
Type
GIT
Repo
https://github.com/bigfork/silverstripe-form-capture
Events
Database specific
{
    "versions": [
        {
            "introduced": "2.0.0"
        },
        {
            "fixed": "2.2.5"
        }
    ]
}
Type
GIT
Repo
https://github.com/bigfork/silverstripe-form-capture
Events
Database specific
{
    "versions": [
        {
            "introduced": "3.0.0"
        },
        {
            "fixed": "3.1.1"
        }
    ]
}

Affected versions

0.*

0.2.0
0.2.1
0.2.3

1.*

1.0
1.0.1

2.*

2.0.0
2.0.1
2.0.2
2.1.0
2.2.0
2.2.1
2.2.2
2.2.3
2.2.4

3.*

3.0.0
3.1.0