You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Fix security vulnerabilities: XSS, open redirect, path traversal, IDOR
- Fix reflected XSS in admin cpanel by escaping user-supplied msg parameter
- Fix stored XSS in comment text output with htmlspecialchars()
- Fix XSS in JavaScript context in podcast template using json_encode()
- Fix open redirect in CwmsermonsController, CwmmediafileController, and
CwmadminController by validating base64-decoded return URLs with
Uri::isInternal()
- Fix path traversal in backup restore by sanitizing upload filename with
File::makeSafe() and basename()
- Fix IDOR in download helper by checking published status and user access
levels before serving media files
- Sanitize Content-Disposition filename header to prevent header injection
- Escape user-supplied handler name in error messages
https://claude.ai/code/session_01Eq9nzEFGHytEtgTiUgTEHt
0 commit comments