2 results (0.002 seconds)

CVSS: 9.8EPSS: 0%CPEs: 6EXPL: 0

Orchid is a Laravel package that allows application development of back-office applications, admin/user panels, and dashboards. A vulnerability present starting in version 14.0.0-alpha4 and prior to version 14.5.0 is related to the deserialization of untrusted data from the `_state` query parameter, which can result in remote code execution. The issue has been addressed in version 14.5.0. Users are advised to upgrade their software to this version or any subsequent versions that include the patch. There are no known workarounds. • https://github.com/orchidsoftware/platform/releases/tag/14.5.0 https://github.com/orchidsoftware/platform/security/advisories/GHSA-ph6g-p72v-pc3p • CWE-502: Deserialization of Untrusted Data •

CVSS: 8.0EPSS: 0%CPEs: 1EXPL: 0

In platform before version 9.4.4, inline attributes are not properly escaped. If the data that came from users was not escaped, then an XSS vulnerability is possible. The issue was introduced in 9.0.0 and fixed in 9.4.4. En platform versiones anteriores a 9.4.4, los atributos en línea no son escapados apropiadamente. Si los datos que provienen de los usuarios no se escaparon, entonces es posible una vulnerabilidad de tipo XSS. • https://github.com/orchidsoftware/platform/commit/03f9a113b1a70bc5075ce86a918707f0e7d82169 https://github.com/orchidsoftware/platform/security/advisories/GHSA-589w-hccm-265x • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •