formiojs@4.0.0-rc.4 vulnerabilities

  • latest version

    4.21.6

  • latest non vulnerable version

  • first published

    8 years ago

  • latest version published

    4 hours ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the formiojs package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Arbitrary Code Execution

    Affected versions of this package are vulnerable to Arbitrary Code Execution due to a potential template injection vulnerability, during deletion of the default Email template URL.\

    Note:

    This issue is only exploitable if using the default template service. The email templating service was removed after 2020. Additionally, the vendor disputes this issue indicating this is sandboxed and only executable by admins.

    How to fix Arbitrary Code Execution?

    Upgrade formiojs to version 4.13.11 or higher.

    <4.13.11
    • M
    Cross-site Scripting (XSS)

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS). It is possible to inject malicious JavaScript within _text field within the Drag and Drop component, which when rendered within the tooltip area results in execution.

    PoC

    {{constructor.constructor("alert('xss')")() }}

    Note: Maintainers believe that all input should be considered unsafe and should be sanitized during output.

    How to fix Cross-site Scripting (XSS)?

    Upgrade formiojs to version 4.12.1-rc.19 or higher.

    <4.12.1-rc.19