Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62798: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in code16 sharp

0
Medium
VulnerabilityCVE-2025-62798cvecve-2025-62798cwe-79
Published: Tue Oct 28 2025 (10/28/2025, 20:58:21 UTC)
Source: CVE Database V5
Vendor/Project: code16
Product: sharp

Description

Sharp is a content management framework built for Laravel as a package. Prior to 9.11.1, a Cross-Site Scripting (XSS) vulnerability was discovered in code16/sharp when rendering content using the SharpShowTextField component. In affected versions, expressions wrapped in {{ & }} were evaluated by Vue. This allowed attackers to inject arbitrary JavaScript or HTML that executes in the browser when the field is displayed. The issue has been fixed in v9.11.1 .

AI-Powered Analysis

AILast updated: 11/05/2025, 02:11:16 UTC

Technical Analysis

CVE-2025-62798 is a Cross-Site Scripting (XSS) vulnerability identified in the code16 sharp content management framework, a Laravel package used for building CMS applications. The vulnerability exists in versions prior to 9.11.1 within the SharpShowTextField component. This component improperly handles user input by evaluating expressions wrapped in {{ & }} using the Vue.js framework. Because Vue evaluates these expressions, an attacker can inject malicious JavaScript or HTML code that executes in the context of the victim's browser when the field is rendered. This improper neutralization of input corresponds to CWE-79. The vulnerability requires the attacker to have at least low privileges (PR:L) and some user interaction (UI:R), such as tricking a user into viewing a crafted page or content field. The CVSS 3.1 base score is 5.4 (medium), reflecting the network attack vector (AV:N), low attack complexity (AC:L), partial confidentiality and integrity impact (C:L/I:L), no availability impact (A:N), and scope change (S:C). The flaw allows attackers to steal sensitive information, manipulate displayed content, or perform actions on behalf of the user within the application context. The issue was fixed in version 9.11.1 by properly sanitizing or disabling the unsafe evaluation of expressions in the SharpShowTextField component. No public exploits have been reported yet, but the vulnerability is significant given the widespread use of Laravel and the sharp package in web applications.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to confidentiality and integrity of web applications built using the sharp framework on Laravel. Attackers exploiting this XSS flaw can execute arbitrary scripts in users’ browsers, potentially stealing session tokens, credentials, or performing unauthorized actions on behalf of users. This can lead to data breaches, account compromise, and erosion of user trust. Although availability is not directly impacted, the indirect consequences such as reputational damage and regulatory penalties under GDPR for data exposure can be severe. Organizations that expose administrative or user-facing interfaces using sharp are particularly at risk. The vulnerability’s requirement for low privileges and user interaction means insider threats or social engineering could facilitate exploitation. Given the growing adoption of Laravel-based CMS solutions in Europe, especially in sectors like government, finance, and e-commerce, the impact could be widespread if unpatched.

Mitigation Recommendations

European organizations should immediately upgrade all instances of the sharp framework to version 9.11.1 or later to remediate this vulnerability. Where immediate patching is not feasible, implement strict Content Security Policies (CSP) to restrict script execution and reduce the impact of injected scripts. Review and sanitize all user-generated content rendered via SharpShowTextField components, avoiding the use of unsafe expression evaluation. Conduct thorough code audits to identify any other instances where Vue expressions might be evaluated unsafely. Educate developers on secure coding practices related to template rendering and input validation in Vue and Laravel environments. Monitor web application logs for unusual input patterns or script injection attempts. Finally, implement multi-factor authentication and session management best practices to limit the impact of any successful XSS exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-10-22T18:55:48.011Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6901300969001fc67a67b9e0

Added to database: 10/28/2025, 9:05:13 PM

Last enriched: 11/5/2025, 2:11:16 AM

Last updated: 12/9/2025, 5:08:42 PM

Views: 73

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats