First published: Sun Nov 21 2021(Updated: )
A malicious content author could create a custom meta tag and execute an arbitrary JavaScript payload. This would require convincing a legitimate user to access a page and enter a custom keyboard shortcut. This requires CMS access to exploit.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/silverstripe/cms | >=4.0.0<4.11.3 | |
composer/silverstripe/cms | >=4.0.0<4.11.3 | 4.11.3 |
Silverstripe silverstripe | >=3.0.0<4.11.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-37421 is a vulnerability that allows a malicious content author to create a custom meta tag and execute an arbitrary JavaScript payload.
Exploiting CVE-2022-37421 requires convincing a legitimate user to access a page and enter a custom keyboard shortcut.
Silverstripe CMS versions 4.0.0 up to 4.11.3 are affected by CVE-2022-37421.
CVE-2022-37421 has a severity rating of medium (5.4).
To fix CVE-2022-37421, update to Silverstripe CMS version 4.11.3 or later.