First published: Thu Apr 10 2025(Updated: )
An elemental block can include an XSS payload, which can be executed when viewing the "Content blocks in use" report. The vulnerability is specific to that report and is a result of failure to cast input prior to including it in the grid field. ### References - https://www.silverstripe.org/download/security-releases/CVE-2025-25197
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Silverstripe Elemental | <5.3.12 | |
composer/dnadesign/silverstripe-elemental | >=2.1.2<5.3.12 | 5.3.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2025-25197 is classified as high due to the potential for XSS attacks.
To fix CVE-2025-25197, upgrade to Silverstripe Elemental version 5.3.13 or later.
CVE-2025-25197 affects Silverstripe Elemental versions up to 5.3.12.
CVE-2025-25197 is a cross-site scripting (XSS) vulnerability.
Yes, CVE-2025-25197 can impact data security as it allows attackers to execute arbitrary scripts in the context of a user's session.