formiojs@2.31.4 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the formiojs package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Arbitrary Code Execution

Affected versions of this package are vulnerable to Arbitrary Code Execution due to a potential template injection vulnerability, during deletion of the default Email template URL.\

Note:

This issue is only exploitable if using the default template service. The email templating service was removed after 2020. Additionally, the vendor disputes this issue indicating this is sandboxed and only executable by admins.

How to fix Arbitrary Code Execution?

Upgrade formiojs to version 4.13.11 or higher.

<4.13.11
  • M
Cross-site Scripting (XSS)

Affected versions of this package are vulnerable to Cross-site Scripting (XSS). It is possible to inject malicious JavaScript within _text field within the Drag and Drop component, which when rendered within the tooltip area results in execution.

PoC

{{constructor.constructor("alert('xss')")() }}

Note: Maintainers believe that all input should be considered unsafe and should be sanitized during output.

How to fix Cross-site Scripting (XSS)?

Upgrade formiojs to version 4.12.1-rc.19 or higher.

<4.12.1-rc.19