Vulnerabilities
Vulnerable Software
Silverstripe silverstripe/cms through 4.11.0 allows XSS.
CVSS Score
5.4
EPSS Score
0.003
Published
2022-11-23
In SilverStripe Framework through 2022-04-07, Stored XSS can occur in javascript link tags added via XMLHttpRequest (XHR).
CVSS Score
5.4
EPSS Score
0.003
Published
2022-06-29
Silverstripe silverstripe/framework 4.8.1 has a quadratic blowup in Convert::xml2array() that enables a remote attack via a crafted XML document.
CVSS Score
6.5
EPSS Score
0.003
Published
2022-06-28
Default SilverStripe GraphQL Server (aka silverstripe/graphql) 3.x through 3.4.1 permission checker not inherited by query subclass.
CVSS Score
4.3
EPSS Score
0.002
Published
2021-10-07
SilverStripe Framework through 4.8.1 allows XSS.
CVSS Score
6.1
EPSS Score
0.005
Published
2021-10-07
In SilverStripe through 4.6.0-rc1, GraphQL doesn't honour MFA (multi-factor authentication) when using basic authentication.
CVSS Score
6.5
EPSS Score
0.002
Published
2021-06-08
SilverStripe through 4.6.0-rc1 has an XXE Vulnerability in CSSContentParser. A developer utility meant for parsing HTML within unit tests can be vulnerable to XML External Entity (XXE) attacks. When this developer utility is misused for purposes involving external or user submitted data in custom project code, it can lead to vulnerabilities such as XSS on HTML output rendered through this custom code. This is now mitigated by disabling external entities during parsing. (The correct CVE ID year is 2020 [CVE-2020-25817, not CVE-2021-25817]).
CVSS Score
4.8
EPSS Score
0.003
Published
2021-06-08
In SilverStripe through 4.6.0-rc1, a FormField with square brackets in the field name skips validation.
CVSS Score
5.3
EPSS Score
0.003
Published
2021-06-08
SilverStripe 4.5.0 allows attackers to read certain records that should not have been placed into a result set. This affects silverstripe/recipe-cms. The automatic permission-checking mechanism in the silverstripe/graphql module does not provide complete protection against lists that are limited (e.g., through pagination), resulting in records that should have failed a permission check being added to the final result set. GraphQL endpoints are configured by default (e.g., for assets), but the admin/graphql endpoint is access protected by default. This limits the vulnerability to all authenticated users, including those with limited permissions (e.g., where viewing records exposed through admin/graphql requires administrator permissions). However, if custom GraphQL endpoints have been configured for a specific implementation (usually under /graphql), this vulnerability could also be exploited through unauthenticated requests. This vulnerability only applies to reading records; it does not allow unauthorised changing of records.
CVSS Score
5.3
EPSS Score
0.002
Published
2020-07-15
In SilverStripe through 4.5, malicious users with a valid Silverstripe CMS login (usually CMS access) can craft profile information which can lead to XSS for other users through specially crafted login form URLs.
CVSS Score
5.4
EPSS Score
0.003
Published
2020-07-15


Contact Us

Shodan ® - All rights reserved