First published: Sun Nov 21 2021(Updated: )
A malicious content author could add arbitrary attributes to HTML editor shortcodes which could be used to inject a JavaScript payload on the front end of the site. The shortcode providers that ship with Silverstripe CMS have been reviewed and attribute whitelists have been implemented where appropriate to negate this risk.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/silverstripe/framework | >=4.0.0<4.11.13 | |
composer/silverstripe/assets | >=1.0.0<1.11.1 | |
composer/silverstripe/framework | >=4.0.0<4.11.13 | 4.11.13 |
composer/silverstripe/assets | >=1.0.0<1.11.1 | 1.11.1 |
Silverstripe Asset Admin | <=1.11.0 | |
Silverstripe Assets | >=1.0.0<=1.11.0 | |
Silverstripe Framework | >=4.0.0<=4.11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-38724 is a vulnerability that allows a malicious content author to inject a JavaScript payload on the front end of a site using arbitrary attributes in HTML editor shortcodes.
CVE-2022-38724 has a severity rating of 5.4 out of 10, which is considered medium.
CVE-2022-38724 affects Silverstripe CMS framework versions 4.0.0 through 4.11.13 and Silverstripe Assets versions 1.0.0 through 1.11.1.
To fix CVE-2022-38724, update your Silverstripe CMS framework and Silverstripe Assets to versions 4.11.13 and 1.11.1 respectively. Refer to the provided references for more information.
CVE-2022-38724 belongs to CWE category 79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').