Bypass Stored XSS in Catalog in pimcore/pimcore


Reported on

Mar 30th 2023

  1. Login in URL :
  2. Go to File -> Perspectives -> Catalog
  3. Click in tab Properties -> footer -> Open
  4. click any Find & Order -> Edit
  5. in tab Basic, inject payload to : Prameters, Anchor in tab Advanced, inject payload to: Class

For more understanding please check POC. // PoC payload to bypass = "><svg><animate onbegin=prompt(document.domain) attributeName=x dur=1s> POC :


An attacker can use XSS to send a malicious script to any user.

We are processing your report and will contact the pimcore team within 24 hours. 2 months ago
We have contacted a member of the pimcore team and are waiting to hear back 2 months ago
a month ago


hi these, any update for me !

a month ago



Christian F. modified the Severity from High (7.6) to Medium (6.3) a month ago
The researcher has received a minor penalty to their credibility for miscalculating the severity: -1
Christian F. validated this vulnerability a month ago
HMs has been awarded the disclosure bounty
The fix bounty is now up for grabs
The researcher's credibility has increased: +7
Divesh Pahuja marked this as fixed in 10.5.21 with commit 697064 a month ago
The fix bounty has been dropped
This vulnerability has been assigned a CVE
Divesh Pahuja published this vulnerability a month ago
to join this conversation