This site has been archived. To learn more about our current products Ibexa Content, Ibexa Experience, Ibexa Commerce head over to the Ibexa Developer Portal

eZ Community » Security Advisories » EZSA-2018-001: Several...

EZSA-2018-001: Several vulnerabilities in Forgot password, Information collector, XML text, and Matrix field type features

Publication date : 26/02/2018
Severity : High
Affected versions : 2017.12.2, 5.4 - 5.1, all community versions at time of writing (legacy only)
Resolving versions : 2017.12.2.1,,, and published security updates for all other supported versions

This security advisory fixes 4 separate vulnerabilities in eZ Publish Legacy, and we recommend that you install it as soon as possible if you are using Legacy by itself or via the LegacyBridge.
First, it increases the randomness, and thus the security, of the pseudo-random bytes used to generate a hash for the "forgot password" feature. This protects accounts against being taken over through attacks trying to predict the hash. If the increased randomness is not available in your PHP installation, it will now log a warning.
Second, it improves security of the information collector feature, by ensuring no collection emails will be sent from invalid manipulated forms.
Third, it stops the possible leaking of the names of content objects that should not be readable for certain users, on installations where these users can create or edit XML text.
Fourth, it protects against cross-site scripting (XSS) in the Matrix data type, on installations where users are allowed to edit content classes / content types.

We recommend that you install the security update as soon as possible.

To install, use Composer to update to one of the "Resolving versions" mentioned above, or apply these patches manually:

Have you found a security bug in eZ Publish or eZ Platform? See how to report it responsibly here:

36 542 Users on board!

Community Project menu

Proudly Developed with from