Reflected XSS in querystring parameters
Moderate severity
GitHub Reviewed
Published
Nov 21, 2022
to the GitHub Advisory Database
•
Updated Apr 29, 2025
Package
Affected versions
>= 4.0.0, < 4.11.13
Patched versions
4.11.13
Description
Published to the GitHub Advisory Database
Nov 21, 2022
Reviewed
Nov 21, 2022
Published by the National Vulnerability Database
Nov 22, 2022
Last updated
Apr 29, 2025
An attacker could inject a XSS payload in a Silverstripe CMS response by carefully crafting a return URL on a /dev/build or /Security/login request.
To exploit this vulnerability, an attacker would need to convince a user to follow a link with a malicious payload.
This will only affect projects configured to output PHP warnings to the browser. By default, Silverstripe CMS will only output PHP warnings if your SS_ENVIRONMENT_TYPE environment variable is set to dev. Production sites should always set SS_ENVIRONMENT_TYPE to live.
References