Skip to content

[GHSA-hcch-w73c-jp4m] Statamic vulnerable to privilege escalation via stored cross-site scripting#7383

Closed
Shirshaw64p wants to merge 1 commit intoShirshaw64p/advisory-improvement-7383from
Shirshaw64p-GHSA-hcch-w73c-jp4m
Closed

[GHSA-hcch-w73c-jp4m] Statamic vulnerable to privilege escalation via stored cross-site scripting#7383
Shirshaw64p wants to merge 1 commit intoShirshaw64p/advisory-improvement-7383from
Shirshaw64p-GHSA-hcch-w73c-jp4m

Conversation

@Shirshaw64p
Copy link
Copy Markdown

Updates

  • Description

Comments
Add name of the credit holder: Shirsendu Mondal (@Shirshaw64p) which is me.

@github
Copy link
Copy Markdown
Collaborator

github commented Apr 13, 2026

Hi there @jasonvarga! A community member has suggested an improvement to your security advisory. If approved, this change will affect the global advisory listed at github.com/advisories. It will not affect the version listed in your project repository.

This change will be reviewed by our Security Curation Team. If you have thoughts or feedback, please share them in a comment here! If this PR has already been closed, you can start a new community contribution for this advisory

Copilot AI review requested due to automatic review settings April 13, 2026 18:40
@github-actions github-actions bot changed the base branch from main to Shirshaw64p/advisory-improvement-7383 April 13, 2026 18:41
Copy link
Copy Markdown
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

Note

Copilot was unable to run its full agentic suite in this review.

Adds an explicit credit entry to the advisory write-up for GHSA-hcch-w73c-jp4m.

Changes:

  • Appends a “### Credits” section to the advisory details text.

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

],
"summary": "Statamic vulnerable to privilege escalation via stored cross-site scripting",
"details": "### Impact\n\nStored XSS in the control panel color mode preference allows authenticated users with control panel access to inject malicious JavaScript that executes when a higher-privileged user impersonates their account.\n\n### Patches\n\nThis has been fixed in 6.6.2.",
"details": "### Impact\n\nStored XSS in the control panel color mode preference allows authenticated users with control panel access to inject malicious JavaScript that executes when a higher-privileged user impersonates their account.\n\n### Patches\n\nThis has been fixed in 6.6.2.\n\n### Credits\nShirsendu Mondal - UNC Pembroke",
Copy link

Copilot AI Apr 13, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The PR description asks to add “Shirsendu Mondal (@Shirshaw64p)”, but the added credits line does not include the GitHub handle and instead includes an affiliation (“UNC Pembroke”). Update the credits line to match the requested attribution (or update the PR description if the intended credit text is different).

Copilot uses AI. Check for mistakes.
],
"summary": "Statamic vulnerable to privilege escalation via stored cross-site scripting",
"details": "### Impact\n\nStored XSS in the control panel color mode preference allows authenticated users with control panel access to inject malicious JavaScript that executes when a higher-privileged user impersonates their account.\n\n### Patches\n\nThis has been fixed in 6.6.2.",
"details": "### Impact\n\nStored XSS in the control panel color mode preference allows authenticated users with control panel access to inject malicious JavaScript that executes when a higher-privileged user impersonates their account.\n\n### Patches\n\nThis has been fixed in 6.6.2.\n\n### Credits\nShirsendu Mondal - UNC Pembroke",
Copy link

Copilot AI Apr 13, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Embedding credits only inside the free-form details markdown can make attribution harder to query/standardize across advisories. If this repository’s advisory schema supports structured attribution (for example, a dedicated credits/acknowledgements field used in other advisories), prefer adding the credit there and keep details focused on impact/patch guidance.

Suggested change
"details": "### Impact\n\nStored XSS in the control panel color mode preference allows authenticated users with control panel access to inject malicious JavaScript that executes when a higher-privileged user impersonates their account.\n\n### Patches\n\nThis has been fixed in 6.6.2.\n\n### Credits\nShirsendu Mondal - UNC Pembroke",
"details": "### Impact\n\nStored XSS in the control panel color mode preference allows authenticated users with control panel access to inject malicious JavaScript that executes when a higher-privileged user impersonates their account.\n\n### Patches\n\nThis has been fixed in 6.6.2.",
"credits": [
{
"name": "Shirsendu Mondal",
"contact": [
"UNC Pembroke"
]
}
],

Copilot uses AI. Check for mistakes.
@jasonvarga
Copy link
Copy Markdown

@Shirshaw64p is already credited as the reporter.

GHSA-hcch-w73c-jp4m

CleanShot 2026-04-14 at 10 02 29

@shelbyc
Copy link
Copy Markdown
Contributor

shelbyc commented Apr 14, 2026

Closing due to Reporter credit already being present in the global GHSA.

@shelbyc shelbyc closed this Apr 14, 2026
@github-actions github-actions bot deleted the Shirshaw64p-GHSA-hcch-w73c-jp4m branch April 14, 2026 16:35
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants