From b4d0329ae104acb79ecbbd650c5858e8e3020f2e Mon Sep 17 00:00:00 2001 From: Shirsendu Mondal <76588814+Shirshaw64p@users.noreply.github.com> Date: Mon, 13 Apr 2026 14:40:45 -0400 Subject: [PATCH] Improve GHSA-hcch-w73c-jp4m --- .../2026/03/GHSA-hcch-w73c-jp4m/GHSA-hcch-w73c-jp4m.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/advisories/github-reviewed/2026/03/GHSA-hcch-w73c-jp4m/GHSA-hcch-w73c-jp4m.json b/advisories/github-reviewed/2026/03/GHSA-hcch-w73c-jp4m/GHSA-hcch-w73c-jp4m.json index 27cdadbc27d6c..59dcc8d6833fe 100644 --- a/advisories/github-reviewed/2026/03/GHSA-hcch-w73c-jp4m/GHSA-hcch-w73c-jp4m.json +++ b/advisories/github-reviewed/2026/03/GHSA-hcch-w73c-jp4m/GHSA-hcch-w73c-jp4m.json @@ -7,7 +7,7 @@ "CVE-2026-32612" ], "summary": "Statamic vulnerable to privilege escalation via stored cross-site scripting", - "details": "### Impact\n\nStored XSS in the control panel color mode preference allows authenticated users with control panel access to inject malicious JavaScript that executes when a higher-privileged user impersonates their account.\n\n### Patches\n\nThis has been fixed in 6.6.2.", + "details": "### Impact\n\nStored XSS in the control panel color mode preference allows authenticated users with control panel access to inject malicious JavaScript that executes when a higher-privileged user impersonates their account.\n\n### Patches\n\nThis has been fixed in 6.6.2.\n\n### Credits\nShirsendu Mondal - UNC Pembroke", "severity": [ { "type": "CVSS_V3",