Skip to content

Potential SSTI vulnerability when using custom fields in Notification Emails

Critical
BenParizek published GHSA-px8v-hxxx-2rgh May 4, 2020

Package

barrelstrength/sprout-base-email

Affected versions

< 1.2.7

Patched versions

1.2.7

Description

Impact

A potential Server-Side Template Injection vulnerability exists in Sprout Forms which could lead to the execution of Twig code.

Patches

The problem is fixed inbarrelstrength/sprout-forms:v3.9.0 which upgrades to barrelstrength/sprout-base-email:v1.2.7

Workarounds

Users unable to upgrade should update any Notification Emails to use the "Basic Notification (Sprout Email)" template and avoid using the "Basic Notification (Sprout Forms)" template or any custom templates that display Form Fields.

References

  • See the release notes in the CHANGELOG
  • Credits to Paweł Hałdrzyński, Daniel Kalinowski from ISEC.PL for discovery and responsible disclosure

For more information

If you have any questions or comments about this advisory:

Severity

Critical

CVE ID

CVE-2020-11056

Weaknesses

No CWEs

Credits