CVE-2018-14059
Description
Pimcore allows XSS via Users, Assets, Data Objects, Video Thumbnails, Image Thumbnails, Field-Collections, Objectbrick, Classification Store, Document Types, Predefined Properties, Predefined Asset Metadata, Quantity Value, and Static Routes functions.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Pimcore 5.2.3 and below are vulnerable to multiple stored XSS flaws that allow authenticated attackers to inject arbitrary JavaScript in virtually all text fields.
Vulnerability
Pimcore versions 5.2.3 and below contain multiple stored cross-site scripting (XSS) vulnerabilities in virtually all text input fields across the Users, Assets, Data Objects, Video Thumbnails, Image Thumbnails, Field-Collections, Objectbrick, Classification Store, Document Types, Predefined Properties, Predefined Asset Metadata, Quantity Value, and Static Routes functions [2][4]. The vendor acknowledged the issue but stated that these XSS vulnerabilities would not be fixed at that time [2][4].
Exploitation
An attacker must first obtain valid authentication credentials to the Pimcore backend. With those credentials, the attacker can craft malicious JavaScript payloads and insert them into any of the mentioned text fields via the usual administrative forms. The payload is then stored on the server and executed in the browser of any authenticated user who views the affected page [2][4].
Impact
Successful exploitation leads to persistent execution of arbitrary JavaScript code in the context of the victim's session. This can result in theft of session cookies, defacement, or unauthorized actions performed on behalf of the victim, potentially compromising the entire Pimcore instance [2][4].
Mitigation
According to available references, the vendor did not provide a fix for these XSS issues in version 5.3.0; the advisory explicitly states that "XSS will not be fixed according to the vendor" [2][4]. No workaround is documented in the public advisories. Organizations still running Pimcore 5.2.3 or earlier should apply general input sanitization, restrict administrative access, and consider upgrading to a later version of Pimcore that may have addressed this class of vulnerability outside the scope of the original report.
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
pimcore/pimcorePackagist | < 5.3.0 | 5.3.0 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- www.exploit-db.com/exploits/45208/mitreexploitx_refsource_EXPLOIT-DB
- github.com/advisories/GHSA-276r-24xq-hwg8ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2018-14059ghsaADVISORY
- packetstormsecurity.com/files/148954/Pimcore-5.2.3-CSRF-Cross-Site-Scripting-SQL-Injection.htmlghsax_refsource_MISCWEB
- seclists.org/fulldisclosure/2018/Aug/13ghsamailing-listx_refsource_FULLDISCWEB
- www.exploit-db.com/exploits/45208ghsaWEB
- www.sec-consult.com/en/blog/advisories/sql-injection-xss-csrf-vulnerabilities-in-pimcore-softwareghsaWEB
- www.sec-consult.com/en/blog/advisories/sql-injection-xss-csrf-vulnerabilities-in-pimcore-software/mitrex_refsource_MISC
News mentions
0No linked articles in our index yet.