From 76675388f16d9c3efee9818b3acbc76410588aea Mon Sep 17 00:00:00 2001 From: Henrique Cabral Date: Thu, 5 Mar 2026 17:43:52 -0300 Subject: [PATCH 1/3] New Vuln: Improper Input Validation in statamic/cms --- input/new.json | 38 ++++++++++++++++++++++++++------------ 1 file changed, 26 insertions(+), 12 deletions(-) diff --git a/input/new.json b/input/new.json index 87646b9a..4fa9236f 100644 --- a/input/new.json +++ b/input/new.json @@ -1,15 +1,29 @@ { - "package_name": "", - "patch_versions": [], - "vulnerable_ranges": [], - "cwe": [], - "tldr": "", - "doest_this_affect_me": "", - "how_to_fix": "", - "vulnerable_to": "", + "package_name": "statamic/cms", + "patch_versions": [ + "6.3.3", + "5.73.10" + ], + "vulnerable_ranges": [ + [ + "6.0.0", + "6.3.2" + ], + [ + "5.0.0", + "5.73.9" + ] + ], + "cwe": [ + "CWE-20" + ], + "tldr": "Affected versions of this package improperly rendered user-controlled content directly into the DOM using mechanisms such as `v-html`, `innerHTML`, and unsanitized HTML returned by `marked`, enabling the injection of arbitrary HTML or JavaScript. Without proper sanitization or escaping, attacker-supplied input could be interpreted as executable markup instead of plain text. An attacker could exploit this by injecting malicious payloads (e.g., `