CVE-2023-4136

7.4 HIGH

📋 TL;DR

This CVE describes a reflected cross-site scripting (XSS) vulnerability in CrafterCMS Engine that allows attackers to inject malicious scripts into web pages. The vulnerability affects CrafterCMS versions 4.0.0 through 4.0.2 and 3.1.0 through 3.1.27 across multiple platforms. Attackers can exploit this by tricking users into clicking specially crafted links.

💻 Affected Systems

Products:
  • CrafterCMS Engine
Versions: 4.0.0 through 4.0.2, 3.1.0 through 3.1.27
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all architectures (x86, ARM, 64-bit) and requires user interaction via crafted links.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, perform actions as authenticated users, redirect to malicious sites, or install malware on user systems.

🟠

Likely Case

Session hijacking, credential theft, and unauthorized actions performed in the context of authenticated users.

🟢

If Mitigated

Limited impact with proper input validation, output encoding, and Content Security Policy (CSP) headers in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit details available in security advisories; reflected XSS typically requires user interaction via malicious links.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.0.3 or 3.1.28

Vendor Advisory: https://docs.craftercms.org/en/4.0/security/advisory.html#cv-2023080301

Restart Required: Yes

Instructions:

1. Backup your CrafterCMS instance. 2. Upgrade to CrafterCMS 4.0.3 or 3.1.28. 3. Restart the CrafterCMS service. 4. Verify the fix by testing XSS payloads.

🔧 Temporary Workarounds

Implement Content Security Policy

all

Add CSP headers to restrict script execution sources

Add 'Content-Security-Policy: default-src 'self'; script-src 'self'' to web server configuration

Input Validation Filter

all

Implement server-side input validation for all user inputs

Configure web application firewall rules to block XSS patterns

🧯 If You Can't Patch

  • Implement strict Content Security Policy headers
  • Deploy web application firewall with XSS protection rules

🔍 How to Verify

Check if Vulnerable:

Check CrafterCMS version against affected ranges: 4.0.0-4.0.2 or 3.1.0-3.1.27

Check Version:

Check CrafterCMS admin panel or configuration files for version information

Verify Fix Applied:

Verify version is 4.0.3+ or 3.1.28+ and test with XSS payloads like <script>alert('test')</script>

📡 Detection & Monitoring

Log Indicators:

  • Unusual URL parameters containing script tags or JavaScript code
  • Multiple failed XSS attempts in web server logs

Network Indicators:

  • HTTP requests with suspicious parameters containing script tags or JavaScript

SIEM Query:

web.url:*<script* OR web.url:*javascript:*

🔗 References

📤 Share & Export