Vulnerability Description
Formie is a Craft CMS plugin for creating forms. Prior to 2.1.6, users with access to a form's settings can include malicious Twig code into fields that support Twig. These might be the Submission Title or the Success Message. This code will then be executed upon creating a submission, or rendering the text. This has been fixed in Formie 2.1.6.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Verbb | Formie | < 2.0.44 |
Related Weaknesses (CWE)
References
- https://github.com/verbb/formie/commit/90296edf7e707f117e760aa57e70dbd43a854420Patch
- https://github.com/verbb/formie/security/advisories/GHSA-v45m-hxqp-fwf5Vendor Advisory
- https://github.com/verbb/formie/commit/90296edf7e707f117e760aa57e70dbd43a854420Patch
- https://github.com/verbb/formie/security/advisories/GHSA-v45m-hxqp-fwf5Vendor Advisory
FAQ
What is CVE-2024-35191?
CVE-2024-35191 is a vulnerability with a CVSS score of 4.4 (MEDIUM). Formie is a Craft CMS plugin for creating forms. Prior to 2.1.6, users with access to a form's settings can include malicious Twig code into fields that support Twig. These might be the Submission Tit...
How severe is CVE-2024-35191?
CVE-2024-35191 has been rated MEDIUM with a CVSS base score of 4.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-35191?
Check the references section above for vendor advisories and patch information. Affected products include: Verbb Formie.