Vulnerabilities (CVE)

Filtered by vendor Silverstripe Subscribe
Filtered by product Silverstripe
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-41559 1 Silverstripe 1 Silverstripe 2023-08-08 4.3 MEDIUM 6.5 MEDIUM
Silverstripe silverstripe/framework 4.8.1 has a quadratic blowup in Convert::xml2array() that enables a remote attack via a crafted XML document.
CVE-2022-24444 1 Silverstripe 1 Silverstripe 2022-07-13 6.4 MEDIUM 6.5 MEDIUM
Silverstripe silverstripe/framework through 4.10 allows Session Fixation.
CVE-2022-28803 1 Silverstripe 1 Silverstripe 2022-07-08 3.5 LOW 5.4 MEDIUM
In SilverStripe Framework through 2022-04-07, Stored XSS can occur in javascript link tags added via XMLHttpRequest (XHR).
CVE-2022-0227 1 Silverstripe 1 Silverstripe 2022-02-10 4.0 MEDIUM 4.3 MEDIUM
Business Logic Errors in GitHub repository silverstripe/silverstripe-framework prior to 4.10.1.
CVE-2021-28661 1 Silverstripe 1 Silverstripe 2021-10-15 4.0 MEDIUM 4.3 MEDIUM
Default SilverStripe GraphQL Server (aka silverstripe/graphql) 3.x through 3.4.1 permission checker not inherited by query subclass.
CVE-2021-36150 1 Silverstripe 1 Silverstripe 2021-10-15 4.3 MEDIUM 6.1 MEDIUM
SilverStripe Framework through 4.8.1 allows XSS.
CVE-2019-16409 2 Silverstripe, Symbiote 2 Silverstripe, Versionedfiles 2021-07-21 5.0 MEDIUM 5.3 MEDIUM
In the Versioned Files module through 2.0.3 for SilverStripe 3.x, unpublished versions of files are publicly exposed to anyone who can guess their URL. This guess could be highly informed by a basic understanding of the symbiote/silverstripe-versionedfiles source code. (Users who upgrade from SilverStripe 3.x to 4.x and had Versioned Files installed have no further need for this module, because the 4.x release has built-in versioning. However, nothing in the upgrade process automates the destruction of these insecure artefacts, nor alerts the user to the criticality of destruction.)
CVE-2020-25817 1 Silverstripe 1 Silverstripe 2021-06-17 3.5 LOW 4.8 MEDIUM
SilverStripe through 4.6.0-rc1 has an XXE Vulnerability in CSSContentParser. A developer utility meant for parsing HTML within unit tests can be vulnerable to XML External Entity (XXE) attacks. When this developer utility is misused for purposes involving external or user submitted data in custom project code, it can lead to vulnerabilities such as XSS on HTML output rendered through this custom code. This is now mitigated by disabling external entities during parsing. (The correct CVE ID year is 2020 [CVE-2020-25817, not CVE-2021-25817]).
CVE-2020-26136 1 Silverstripe 1 Silverstripe 2021-06-16 4.0 MEDIUM 6.5 MEDIUM
In SilverStripe through 4.6.0-rc1, GraphQL doesn't honour MFA (multi-factor authentication) when using basic authentication.
CVE-2020-26138 1 Silverstripe 1 Silverstripe 2021-06-16 5.0 MEDIUM 5.3 MEDIUM
In SilverStripe through 4.6.0-rc1, a FormField with square brackets in the field name skips validation.
CVE-2015-8606 1 Silverstripe 1 Silverstripe 2020-10-29 4.3 MEDIUM 6.1 MEDIUM
Multiple cross-site scripting (XSS) vulnerabilities in SilverStripe CMS & Framework before 3.1.16 and 3.2.x before 3.2.1 allow remote attackers to inject arbitrary web script or HTML via the (1) Locale or (2) FailedLoginCount parameter to admin/security/EditForm/field/Members/item/new/ItemEditForm.
CVE-2019-12245 1 Silverstripe 1 Silverstripe 2020-08-24 5.0 MEDIUM 5.3 MEDIUM
SilverStripe through 4.3.3 has incorrect access control for protected files uploaded via Upload::loadIntoFile(). An attacker may be able to guess a filename in silverstripe/assets via the AssetControlExtension.
CVE-2019-19326 1 Silverstripe 1 Silverstripe 2020-07-23 4.3 MEDIUM 5.9 MEDIUM
Silverstripe CMS sites through 4.4.4 which have opted into HTTP Cache Headers on responses served by the framework's HTTP layer can be vulnerable to web cache poisoning. Through modifying the X-Original-Url and X-HTTP-Method-Override headers, responses with malicious HTTP headers can return unexpected responses to other consumers of this cached response. Most other headers associated with web cache poisoning are already disabled through request hostname forgery whitelists.
CVE-2020-6165 1 Silverstripe 1 Silverstripe 2020-07-23 5.0 MEDIUM 5.3 MEDIUM
SilverStripe 4.5.0 allows attackers to read certain records that should not have been placed into a result set. This affects silverstripe/recipe-cms. The automatic permission-checking mechanism in the silverstripe/graphql module does not provide complete protection against lists that are limited (e.g., through pagination), resulting in records that should have failed a permission check being added to the final result set. GraphQL endpoints are configured by default (e.g., for assets), but the admin/graphql endpoint is access protected by default. This limits the vulnerability to all authenticated users, including those with limited permissions (e.g., where viewing records exposed through admin/graphql requires administrator permissions). However, if custom GraphQL endpoints have been configured for a specific implementation (usually under /graphql), this vulnerability could also be exploited through unauthenticated requests. This vulnerability only applies to reading records; it does not allow unauthorised changing of records.
CVE-2020-9311 1 Silverstripe 1 Silverstripe 2020-07-22 3.5 LOW 5.4 MEDIUM
In SilverStripe through 4.5, malicious users with a valid Silverstripe CMS login (usually CMS access) can craft profile information which can lead to XSS for other users through specially crafted login form URLs.
CVE-2019-19325 1 Silverstripe 1 Silverstripe 2020-02-20 4.3 MEDIUM 6.1 MEDIUM
SilverStripe through 4.4.x before 4.4.5 and 4.5.x before 4.5.2 allows Reflected XSS on the login form and custom forms. Silverstripe Forms allow malicious HTML or JavaScript to be inserted through non-scalar FormField attributes, which allows performing XSS (Cross-Site Scripting) on some forms built with user input (Request data). This can lead to phishing attempts to obtain a user's credentials or other sensitive user input.
CVE-2019-12246 1 Silverstripe 1 Silverstripe 2020-02-20 4.3 MEDIUM 4.3 MEDIUM
SilverStripe through 4.3.3 allows a Denial of Service on flush and development URL tools.
CVE-2019-12203 1 Silverstripe 1 Silverstripe 2019-09-27 3.7 LOW 6.3 MEDIUM
SilverStripe through 4.3.3 allows session fixation in the "change password" form.
CVE-2019-14273 1 Silverstripe 1 Silverstripe 2019-09-27 5.0 MEDIUM 5.3 MEDIUM
In SilverStripe assets 4.0, there is broken access control on files.
CVE-2019-14272 1 Silverstripe 1 Silverstripe 2019-09-26 3.5 LOW 5.4 MEDIUM
In SilverStripe asset-admin 4.0, there is XSS in file titles managed through the CMS.
CVE-2019-12205 1 Silverstripe 1 Silverstripe 2019-09-26 4.3 MEDIUM 6.1 MEDIUM
SilverStripe through 4.3.3 has Flash Clipboard Reflected XSS.
CVE-2017-5197 1 Silverstripe 1 Silverstripe 2019-03-19 4.3 MEDIUM 6.1 MEDIUM
There is XSS in SilverStripe CMS before 3.4.4 and 3.5.x before 3.5.2. The attack vector is a page name. An example payload is a crafted JavaScript event handler within a malformed SVG element.
CVE-2017-18049 1 Silverstripe 1 Silverstripe 2018-02-13 4.3 MEDIUM 5.5 MEDIUM
In the CSV export feature of SilverStripe before 3.5.6, 3.6.x before 3.6.3, and 4.x before 4.0.1, it's possible for the output to contain macros and scripts, which may be executed if imported without sanitization into common software (including Microsoft Excel). For example, the CSV data may contain untrusted user input from the "First Name" field of a user's /myprofile page.
CVE-2017-12849 1 Silverstripe 1 Silverstripe 2017-11-03 5.0 MEDIUM 5.3 MEDIUM
Response discrepancy in the login and password reset forms in SilverStripe CMS before 3.5.5 and 3.6.x before 3.6.1 allows remote attackers to enumerate users via timing attacks.
CVE-2017-14498 1 Silverstripe 1 Silverstripe 2017-11-02 4.3 MEDIUM 6.1 MEDIUM
SilverStripe CMS before 3.6.1 has XSS via an SVG document that is mishandled by (1) the Insert Media option in the content editor or (2) an admin/assets/add pathname, as demonstrated by the admin/pages/edit/EditorToolbar/MediaForm/field/AssetUploadField/upload URI, aka issue SS-2017-017.