You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/update_and_migration/from_3.3/update_from_3.3.md
+13Lines changed: 13 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -538,6 +538,19 @@ Evaluate the vulnerability to determine whether you might have been affected.
538
538
If so, take appropriate action.
539
539
There are no additional update steps to execute.
540
540
541
+
### v3.3.43
542
+
543
+
#### Security
544
+
545
+
This security advisory resolves XSS vulnerabilities in several parts of the back office of the DXP.
546
+
Back office access and varying levels of editing and management permissions are required to exploit these vulnerabilities.
547
+
548
+
For more information, see the [security advisory IBEXA-SA-2025-003](https://developers.ibexa.co/security-advisories/ibexa-sa-2025-003-xss-vulnerabilities-in-back-office).
549
+
550
+
Evaluate the vulnerability to determine whether you might have been affected.
551
+
If so, take appropriate action.
552
+
There are no additional update steps to execute.
553
+
541
554
## Finish the update
542
555
543
556
[[% include 'snippets/update/finish_the_update.md' %]]
Copy file name to clipboardExpand all lines: docs/update_and_migration/from_4.6/update_from_4.6.md
+37Lines changed: 37 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -322,3 +322,40 @@ vendor/bin/rector --dry-run
322
322
``` bash
323
323
vendor/bin/rector
324
324
```
325
+
326
+
## v4.6.20
327
+
328
+
No additional steps needed.
329
+
330
+
## 4.6.21
331
+
332
+
### Security
333
+
334
+
This security advisory resolves XSS vulnerabilities in several parts of the back office of the DXP.
335
+
Back office access and varying levels of editing and management permissions are required to exploit these vulnerabilities.
336
+
337
+
For more information, see the [security advisory IBEXA-SA-2025-003](https://developers.ibexa.co/security-advisories/ibexa-sa-2025-003-xss-vulnerabilities-in-back-office).
338
+
339
+
Evaluate the vulnerability to determine whether you might have been affected.
340
+
If so, take appropriate action.
341
+
There are no additional update steps to execute.
342
+
343
+
### Database update
344
+
345
+
Run the following scripts:
346
+
347
+
=== "MySQL"
348
+
349
+
``` bash
350
+
mysql -u <username> -p <password> <database_name> < vendor/ibexa/installer/upgrade/db/mysql/ibexa-4.6.20-to-4.6.21.sql
0 commit comments