Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-0630 | laminas-form is a package for validating and displaying simple and complex forms. When rendering validation error messages via the `formElementErrors()` view helper shipped with laminas-form, many messages will contain the submitted value. However, in laminas-form prior to version 3.1.1, the value was not being escaped for HTML contexts, which could potentially lead to a reflected cross-site scripting attack. Versions 3.1.1 and above contain a patch to mitigate the vulnerability. A workaround is available. One may manually place code at the top of a view script where one calls the `formElementErrors()` view helper. More information about this workaround is available on the GitHub Security Advisory. |
Github GHSA |
GHSA-jq4p-mq33-w375 | Cross-site Scripting when rendering error messages in laminas-form |
Wed, 23 Apr 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-04-23T19:08:45.281Z
Reserved: 2022-01-19T00:00:00.000Z
Link: CVE-2022-23598
Updated: 2024-08-03T03:43:46.896Z
Status : Modified
Published: 2022-01-28T22:15:16.770
Modified: 2024-11-21T06:48:53.950
Link: CVE-2022-23598
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA