Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. sulu/sulu
  4. ›
  5. CVE-2021-41169

CVE-2021-41169: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

October 22, 2021

Sulu is an open-source PHP content management system based on the Symfony framework. In versions before 1.6.43 are subject to stored cross site scripting attacks. HTML input into Tag names is not properly sanitized. Only admin users are allowed to create tags. Users are advised to upgrade.

References

  • github.com/advisories/GHSA-h58v-g3q6-q9fx
  • github.com/sulu/sulu/commit/20007ac70a3af3c9e53a6acb0ef8794b65642445
  • github.com/sulu/sulu/security/advisories/GHSA-h58v-g3q6-q9fx
  • nvd.nist.gov/vuln/detail/CVE-2021-41169

Code Behaviors & Features

Detect and mitigate CVE-2021-41169 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.6.43

Fixed versions

  • 1.6.43

Solution

Upgrade to version 1.6.43 or above.

Impact 4.8 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Source file

packagist/sulu/sulu/CVE-2021-41169.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:44 +0000.