First published: Thu Apr 10 2025(Updated: )
### Impact A bad actor with access to edit content in the CMS could send a specifically crafted encoded payload to the server, which could be used to inject a JavaScript payload on the front end of the site. The payload would be sanitised on the client-side, but server-side sanitisation doesn't catch it. The server-side sanitisation logic has been updated to sanitise against this attack. ### Reported by James Nicoll from Fujitsu Cyber ### References - https://www.silverstripe.org/download/security-releases/cve-2025-30148
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Silverstripe Framework | <5.3.23 | |
composer/silverstripe/framework | <5.3.23 | 5.3.23 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-30148 is classified as a high severity vulnerability due to its potential for JavaScript injection.
To mitigate CVE-2025-30148, upgrade the Silverstripe Framework to version 5.3.23 or later immediately.
Any user of the Silverstripe Framework prior to version 5.3.23 is vulnerable to CVE-2025-30148.
CVE-2025-30148 is a web application vulnerability that allows for cross-site scripting (XSS) via script injection.
Bad actors can leverage CVE-2025-30148 to execute malicious JavaScript on the front end of websites utilizing the vulnerable Silverstripe Framework.