Leantime v2.3.27 is vulnerable to Stored HTML Injection. The firstname and lastname fields in the admin user edit page are rendered without HTML escaping, allowing an authenticated user to inject arbitrary HTML that executes when the profile is viewed.
value="<?php echo $values['firstname'] ?>"
value="<?php echo $values['lastname'] ?>"
These fields output raw user input without sanitization.
value="<?php echo htmlspecialchars($values['firstname'], ENT_QUOTES, 'UTF-8') ?>"
value="<?php echo htmlspecialchars($values['lastname'], ENT_QUOTES, 'UTF-8') ?>"
Summary
Leantime v2.3.27 is vulnerable to Stored HTML Injection. The
firstnameandlastnamefields in the admin user edit page are rendered without HTML escaping, allowing an authenticated user to inject arbitrary HTML that executes when the profile is viewed.Vulnerable File
app/Domain/Users/Templates/editUser.tpl.phpVulnerable Code (Lines ~14-17)
These fields output raw user input without sanitization.
Steps to Reproduce
<h1>INJECTED</h1>Fix
Replace unescaped
echowithhtmlspecialchars():Or use the existing
$this->e()helper already used ineditOwn.tpl.php.Impact
References