Skip to content

Commit 48eaccb

Browse files
1 parent 318be3d commit 48eaccb

File tree

1 file changed

+18
-7
lines changed

1 file changed

+18
-7
lines changed

advisories/github-reviewed/2025/11/GHSA-qv78-c8hc-438r/GHSA-qv78-c8hc-438r.json

Lines changed: 18 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -8,12 +8,7 @@
88
],
99
"summary": "OpenMage vulnerable to XSS in Admin Notifications",
1010
"details": "### Summary\nOpenMage versions v20.15.0 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an admin with direct database access or the admin notification feed source to inject malicious scripts into vulnerable fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.\n\n### Details\nUnescaped translation strings and URLs are printed into contexts inside `app/code/core/Mage/Adminhtml/Block/Notification/Grid/Renderer/Actions.php`. A malicious translation or polluted data can inject script. \n- Link labels use __() without escaping.\n- ’deleteConfirm()’ embeds a message without escaping.\n\n### PoC\n1. Add XSS to admin locale (e.g. app/locale/en_US/local.csv):\n ```\n \"Read Details\",\"<img src=x onerror=alert(123)>\"\n \"Mark as Read\",\"<script>alert(123)</script>\"\n ```\n2. Flush Cache. Make sure locale is set to en_US.\n3. Add any admin notification (e.g. via test.php)\n ```\n <?php\n require 'app/Mage.php';\n Mage::app('admin');\n Mage::getModel('adminnotification/inbox')->setData([\n 'severity' => Mage_AdminNotification_Model_Inbox::SEVERITY_NOTICE,\n 'date_added' => now(),\n 'title' => 'XSS renderer test',\n 'description' => 'Testing actions renderer',\n 'url' => 'https://example.com', // makes the \"Read Details\" link appear\n 'is_read' => 0, // makes the \"Mark as Read\" link appear\n 'is_remove' => 0,\n ])->save();\n ```\n4. Open Admin → System → Notifications → Inbox.\n5. Profit.\n\n### Impact\nThe vulnerability is only exploitable by an attacker with administrative or translation privileges. Malicious JavaScript may be executed in a victim’s browser when they browse to the admin page containing the vulnerable fields.",
11-
"severity": [
12-
{
13-
"type": "CVSS_V4",
14-
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N"
15-
}
16-
],
11+
"severity": [],
1712
"affected": [
1813
{
1914
"package": {
@@ -33,6 +28,22 @@
3328
]
3429
}
3530
]
31+
},
32+
{
33+
"package": {
34+
"ecosystem": "Pub",
35+
"name": "openmage/magento-lts"
36+
},
37+
"ranges": [
38+
{
39+
"type": "ECOSYSTEM",
40+
"events": [
41+
{
42+
"introduced": "0"
43+
}
44+
]
45+
}
46+
]
3647
}
3748
],
3849
"references": [
@@ -57,7 +68,7 @@
5768
"cwe_ids": [
5869
"CWE-79"
5970
],
60-
"severity": "MODERATE",
71+
"severity": "CRITICAL",
6172
"github_reviewed": true,
6273
"github_reviewed_at": "2025-11-03T20:24:10Z",
6374
"nvd_published_at": "2025-11-06T21:15:43Z"

0 commit comments

Comments
 (0)