GHSA-2jqj-5qv2-xvcg

Suggest an improvement
Source
https://github.com/advisories/GHSA-2jqj-5qv2-xvcg
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/04/GHSA-2jqj-5qv2-xvcg/GHSA-2jqj-5qv2-xvcg.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-2jqj-5qv2-xvcg
Published
2025-04-10T12:25:09Z
Modified
2025-04-10T12:34:51.743310Z
Severity
  • 7.1 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N CVSS Calculator
Summary
ezsystems/ezplatform-richtext allows access to external entities in XML
Details

Impact

This security advisory resolves a vulnerability in the RichText field type. By entering a maliciously crafted input into the RichText XML, an attacker could perform an attack using XML external entity (XXE) injection, which might be able to read files on the server. To exploit this vulnerability the attacker would need to already have edit permission to content with RichText fields, which typically means Editor role or higher. The fix removes unsafe elements from XML code, while preserving safe elements.

If you have a stored XXE attack in your content drafts, the fix prevents it from extracting data both during editing and preview. However, if such an attack has already been published and the result is stored in the content, it is unfortunately not possible to detect and remove it by automatic means.

Credits

This vulnerability was discovered and reported to Ibexa by Dennis Henke, Thorsten Niephaus, Marat Aytuganov, and Stephan Sekula of Compass Security Deutschland GmbH. We thank them for reporting it responsibly to us.

Patches

  • See "Patched versions"
  • https://github.com/ezsystems/ezplatform-richtext/commit/5ba2a82cc3aa6235ecfe87278e20c1451d9df913

Workarounds

  • Exploitation requires edit access to RichText content. If you can trust your editors, and you don't grant edit permission to any externals, you are not at risk in practice.

References

  • https://developers.ibexa.co/security-advisories/ibexa-sa-2025-002-xxe-vulnerability-in-richtext
Database specific
{
    "nvd_published_at": null,
    "cwe_ids": [
        "CWE-611"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2025-04-10T12:25:09Z"
}
References

Affected packages

Packagist / ezsystems/ezplatform-richtext

Package

Name
ezsystems/ezplatform-richtext
Purl
pkg:composer/ezsystems/ezplatform-richtext

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.3.0-beta1
Fixed
2.3.26

Affected versions

v2.*

v2.3.0-beta1
v2.3.0-rc1
v2.3.0-rc2
v2.3.0
v2.3.1
v2.3.2
v2.3.3
v2.3.4
v2.3.5
v2.3.6
v2.3.7
v2.3.7.1
v2.3.8
v2.3.9
v2.3.10
v2.3.11
v2.3.12
v2.3.13
v2.3.14
v2.3.15
v2.3.16
v2.3.17
v2.3.18
v2.3.19
v2.3.20
v2.3.21
v2.3.22
v2.3.23
v2.3.24
v2.3.25