CVE-2026-31822 PUBLISHED

Sylius has a XSS vulnerability in checkout login form

Assigner: GitHub_M
Reserved: 09.03.2026 Published: 10.03.2026 Updated: 10.03.2026

Sylius is an Open Source eCommerce Framework on Symfony. A cross-site scripting (XSS) vulnerability exists in the shop checkout login form handled by the ApiLoginController Stimulus controller. When a login attempt fails, AuthenticationFailureHandler returns a JSON response whose message field is rendered into the DOM using innerHTML, allowing any HTML or JavaScript in that value to be parsed and executed by the browser. The issue is fixed in versions: 2.0.16, 2.1.12, 2.2.3 and above.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
CVSS Score: 5.3

Product Status

Vendor Sylius
Product Sylius
Versions
  • Version >= 2.2.0, < 2.2.3 is affected
  • Version >= 2.1.0, < 2.1.12 is affected
  • Version >= 2.0.0, < 2.0.16 is affected

References

Problem Types

  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE