VYPR
Moderate severityNVD Advisory· Published Aug 24, 2018· Updated Aug 5, 2024

CVE-2018-14059

CVE-2018-14059

Description

Pimcore allows XSS via Users, Assets, Data Objects, Video Thumbnails, Image Thumbnails, Field-Collections, Objectbrick, Classification Store, Document Types, Predefined Properties, Predefined Asset Metadata, Quantity Value, and Static Routes functions.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Pimcore 5.2.3 and below are vulnerable to multiple stored XSS flaws that allow authenticated attackers to inject arbitrary JavaScript in virtually all text fields.

Vulnerability

Pimcore versions 5.2.3 and below contain multiple stored cross-site scripting (XSS) vulnerabilities in virtually all text input fields across the Users, Assets, Data Objects, Video Thumbnails, Image Thumbnails, Field-Collections, Objectbrick, Classification Store, Document Types, Predefined Properties, Predefined Asset Metadata, Quantity Value, and Static Routes functions [2][4]. The vendor acknowledged the issue but stated that these XSS vulnerabilities would not be fixed at that time [2][4].

Exploitation

An attacker must first obtain valid authentication credentials to the Pimcore backend. With those credentials, the attacker can craft malicious JavaScript payloads and insert them into any of the mentioned text fields via the usual administrative forms. The payload is then stored on the server and executed in the browser of any authenticated user who views the affected page [2][4].

Impact

Successful exploitation leads to persistent execution of arbitrary JavaScript code in the context of the victim's session. This can result in theft of session cookies, defacement, or unauthorized actions performed on behalf of the victim, potentially compromising the entire Pimcore instance [2][4].

Mitigation

According to available references, the vendor did not provide a fix for these XSS issues in version 5.3.0; the advisory explicitly states that "XSS will not be fixed according to the vendor" [2][4]. No workaround is documented in the public advisories. Organizations still running Pimcore 5.2.3 or earlier should apply general input sanitization, restrict administrative access, and consider upgrading to a later version of Pimcore that may have addressed this class of vulnerability outside the scope of the original report.

AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
pimcore/pimcorePackagist
< 5.3.05.3.0

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.