Vulnerabilities (CVE)

Filtered by vendor Silverstripe Subscribe
Total 85 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-40180 1 Silverstripe 1 Graphql 2024-11-21 N/A 7.5 HIGH
silverstripe-graphql is a package which serves Silverstripe data in GraphQL representations. An attacker could use a recursive graphql query to execute a Distributed Denial of Service attack (DDOS attack) against a website. This mostly affects websites with publicly exposed graphql schemas. If your Silverstripe CMS project does not expose a public facing graphql schema, a user account is required to trigger the DDOS attack. If your site is hosted behind a content delivery network (CDN), such as Imperva or CloudFlare, this may further mitigate the risk. This issue has been addressed in versions 3.8.2, 4.1.3, 4.2.5, 4.3.4, and 5.0.3. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE-2023-28104 1 Silverstripe 1 Graphql 2024-11-21 N/A 7.5 HIGH
`silverstripe/graphql` serves Silverstripe data as GraphQL representations. In versions 4.2.2 and 4.1.1, an attacker could use a specially crafted graphql query to execute a denial of service attack against a website which has a publicly exposed graphql endpoint. This mostly affects websites with particularly large/complex graphql schemas. Users should upgrade to `silverstripe/graphql` 4.2.3 or 4.1.2 to remedy the vulnerability.
CVE-2023-22729 1 Silverstripe 1 Framework 2024-11-21 N/A 5.4 MEDIUM
Silverstripe Framework is the Model-View-Controller framework that powers the Silverstripe content management system. Prior to version 4.12.15, an attacker can display a link to a third party website on a login screen by convincing a legitimate content author to follow a specially crafted link. Users should upgrade to Silverstripe Framework 4.12.15 or above to address the issue.
CVE-2023-22728 1 Silverstripe 1 Framework 2024-11-21 N/A 4.3 MEDIUM
Silverstripe Framework is the Model-View-Controller framework that powers the Silverstripe content management system. Prior to version 4.12.15, the GridField print view incorrectly validates the permission of DataObjects potentially allowing a content author to view records they are not authorised to access. Users should upgrade to Silverstripe Framework 4.12.15 or above to address the issue.
CVE-2022-42949 1 Silverstripe 1 Subsites 2024-11-21 N/A 7.5 HIGH
Silverstripe silverstripe/subsites through 2.6.0 has Insecure Permissions.
CVE-2022-38724 1 Silverstripe 3 Asset Admin, Assets, Framework 2024-11-21 N/A 5.4 MEDIUM
Silverstripe silverstripe/framework through 4.11.0, silverstripe/assets through 1.11.0, and silverstripe/asset-admin through 1.11.0 allow XSS.
CVE-2022-38462 1 Silverstripe 1 Framework 2024-11-21 N/A 6.1 MEDIUM
Silverstripe silverstripe/framework through 4.11 is vulnerable to XSS by carefully crafting a return URL on a /dev/build or /Security/login request.
CVE-2022-38148 1 Silverstripe 1 Framework 2024-11-21 N/A 8.8 HIGH
Silverstripe silverstripe/framework through 4.11 allows SQL Injection.
CVE-2022-38147 1 Silverstripe 1 Framework 2024-11-21 N/A 5.4 MEDIUM
Silverstripe silverstripe/framework through 4.11 allows XSS (issue 3 of 3).
CVE-2022-38146 1 Silverstripe 1 Framework 2024-11-21 N/A 5.4 MEDIUM
Silverstripe silverstripe/framework through 4.11 allows XSS (issue 2 of 3).
CVE-2022-38145 1 Silverstripe 1 Framework 2024-11-21 N/A 5.4 MEDIUM
Silverstripe silverstripe/framework through 4.11 allows XSS (issue 1 of 3) via remote attackers adding a Javascript payload to a page's meta description and get it executed in the versioned history compare view.
CVE-2022-37430 1 Silverstripe 1 Framework 2024-11-21 N/A 5.4 MEDIUM
Silverstripe silverstripe/framework through 4.11 allows XSS vulnerability via href attribute of a link (issue 2 of 2).
CVE-2022-37429 1 Silverstripe 1 Framework 2024-11-21 N/A 5.4 MEDIUM
Silverstripe silverstripe/framework through 4.11 allows XSS (issue 1 of 2) via JavaScript payload to the href attribute of a link by splitting a javascript URL with white space characters.
CVE-2022-37421 1 Silverstripe 1 Silverstripe 2024-11-21 N/A 5.4 MEDIUM
Silverstripe silverstripe/cms through 4.11.0 allows XSS.
CVE-2022-29858 1 Silverstripe 1 Assets 2024-11-21 4.0 MEDIUM 4.3 MEDIUM
Silverstripe silverstripe/assets through 1.10 is vulnerable to improper access control that allows protected images to be published by changing an existing image short code on website content.
CVE-2022-29254 1 Silverstripe 1 Silverstripe-omnipay 2024-11-21 5.8 MEDIUM 3.7 LOW
silverstripe-omnipay is a SilverStripe integration with Omnipay PHP payments library. For a subset of Omnipay gateways (those that use intermediary states like `isNotification()` or `isRedirect()`), if the payment identifier or success URL is exposed it is possible for payments to be prematurely marked as completed without payment being taken. This is mitigated by the fact that most payment gateways hide this information from users, however some issuing banks offer flawed 3DSecure implementations that may inadvertently expose this data. The following versions have been patched to fix this issue: `2.5.2`, `3.0.2`, `3.1.4`, and `3.2.1`. There are no known workarounds for this vulnerability.
CVE-2022-28803 1 Silverstripe 1 Silverstripe 2024-11-21 3.5 LOW 5.4 MEDIUM
In SilverStripe Framework through 2022-04-07, Stored XSS can occur in javascript link tags added via XMLHttpRequest (XHR).
CVE-2022-25238 1 Silverstripe 1 Framework 2024-11-21 3.5 LOW 5.4 MEDIUM
Silverstripe silverstripe/framework through 4.10.0 allows XSS, inside of script tags that can can be added to website content via XHR by an authenticated CMS user if the cwp-core module is not installed on the sanitise_server_side contig is not set to true in project code.
CVE-2022-24444 1 Silverstripe 1 Silverstripe 2024-11-21 6.4 MEDIUM 6.5 MEDIUM
Silverstripe silverstripe/framework through 4.10 allows Session Fixation.
CVE-2021-41559 1 Silverstripe 1 Silverstripe 2024-11-21 4.3 MEDIUM 6.5 MEDIUM
Silverstripe silverstripe/framework 4.8.1 has a quadratic blowup in Convert::xml2array() that enables a remote attack via a crafted XML document.