Lookup for vulnerable packages by Package URL.
| Purl | pkg:composer/silverstripe/cms@4.4.5 |
| Type | composer |
| Namespace | silverstripe |
| Name | cms |
| Version | 4.4.5 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | true |
| Next_non_vulnerable_version | 4.11.3 |
| Latest_non_vulnerable_version | 4.11.3 |
| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-2f9j-ek3x-kbc5 |
| vulnerability_id |
VCID-2f9j-ek3x-kbc5 |
| summary |
Silverstripe CMS XSS Vulnerability
In SilverStripe through 4.5, malicious users with a valid Silverstripe CMS login (usually CMS access) can craft profile information which can lead to XSS for other users through specially crafted login form URLs. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-9311 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00343 |
| scoring_system |
epss |
| scoring_elements |
0.56963 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00343 |
| scoring_system |
epss |
| scoring_elements |
0.56823 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00343 |
| scoring_system |
epss |
| scoring_elements |
0.56917 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00343 |
| scoring_system |
epss |
| scoring_elements |
0.56939 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00343 |
| scoring_system |
epss |
| scoring_elements |
0.56914 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00343 |
| scoring_system |
epss |
| scoring_elements |
0.56966 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00343 |
| scoring_system |
epss |
| scoring_elements |
0.56969 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00343 |
| scoring_system |
epss |
| scoring_elements |
0.56977 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00343 |
| scoring_system |
epss |
| scoring_elements |
0.56957 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00343 |
| scoring_system |
epss |
| scoring_elements |
0.56934 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-9311 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-9311, GHSA-2pw2-qpcp-m47x
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2f9j-ek3x-kbc5 |
|
| 1 |
| url |
VCID-4x32-t75c-u3bj |
| vulnerability_id |
VCID-4x32-t75c-u3bj |
| summary |
Silverstipe CMS Stored XSS in custom meta tags
A malicious content author could create a custom meta tag and execute an arbitrary JavaScript payload. This would require convincing a legitimate user to access a page and enter a custom keyboard shortcut.
This requires CMS access to exploit. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-37421 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00322 |
| scoring_system |
epss |
| scoring_elements |
0.55208 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00322 |
| scoring_system |
epss |
| scoring_elements |
0.55271 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00322 |
| scoring_system |
epss |
| scoring_elements |
0.55233 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00322 |
| scoring_system |
epss |
| scoring_elements |
0.55251 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00322 |
| scoring_system |
epss |
| scoring_elements |
0.55272 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00322 |
| scoring_system |
epss |
| scoring_elements |
0.55232 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00322 |
| scoring_system |
epss |
| scoring_elements |
0.5526 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00322 |
| scoring_system |
epss |
| scoring_elements |
0.55259 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00322 |
| scoring_system |
epss |
| scoring_elements |
0.5521 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-37421 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-37421, GHSA-pp74-g2q5-j4jf, GMS-2022-6855
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4x32-t75c-u3bj |
|
| 2 |
| url |
VCID-g366-c4n9-vfcs |
| vulnerability_id |
VCID-g366-c4n9-vfcs |
| summary |
Silverstripe CMS malicious file upload enables script execution
Silverstripe CMS through 4.5 can be susceptible to script execution from malicious upload contents under allowed file extensions (for example HTML code in a TXT file). When these files are stored as protected or draft files, the MIME detection can cause browsers to execute the file contents. Uploads stored as protected or draft files are allowed by default for authorised users only, but can also be enabled through custom logic as well as modules such as silverstripe/userforms. Sites using the previously optional silverstripe/mimevalidator module can configure MIME whitelists rather than extension whitelists, and hence prevent this issue. Sites on the Common Web Platform (CWP) use this module by default, and are not affected. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-9309 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00727 |
| scoring_system |
epss |
| scoring_elements |
0.72586 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00727 |
| scoring_system |
epss |
| scoring_elements |
0.7265 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00727 |
| scoring_system |
epss |
| scoring_elements |
0.72608 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00727 |
| scoring_system |
epss |
| scoring_elements |
0.72618 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00727 |
| scoring_system |
epss |
| scoring_elements |
0.72635 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00727 |
| scoring_system |
epss |
| scoring_elements |
0.72612 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00727 |
| scoring_system |
epss |
| scoring_elements |
0.72562 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00727 |
| scoring_system |
epss |
| scoring_elements |
0.72569 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00727 |
| scoring_system |
epss |
| scoring_elements |
0.726 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-9309 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-9309, GHSA-h77w-655f-6j3m
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-g366-c4n9-vfcs |
|
| 3 |
| url |
VCID-gme6-wj87-ekfw |
| vulnerability_id |
VCID-gme6-wj87-ekfw |
| summary |
Silverstripe CMS information disclosure
In SilverStripe through 4.5.0, a specific URL path configured by default through the silverstripe/framework module can be used to disclose the fact that a domain is hosting a Silverstripe application. There is no disclosure of the specific version. The functionality on this URL path is limited to execution in a CLI context, and is not known to present a vulnerability through web-based access. As a side-effect, this preconfigured path also blocks the creation of other resources on this path (e.g. a page). |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-6164 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00703 |
| scoring_system |
epss |
| scoring_elements |
0.72027 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00703 |
| scoring_system |
epss |
| scoring_elements |
0.72107 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00703 |
| scoring_system |
epss |
| scoring_elements |
0.72066 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00703 |
| scoring_system |
epss |
| scoring_elements |
0.72082 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00703 |
| scoring_system |
epss |
| scoring_elements |
0.72099 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00703 |
| scoring_system |
epss |
| scoring_elements |
0.72076 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00703 |
| scoring_system |
epss |
| scoring_elements |
0.72063 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00703 |
| scoring_system |
epss |
| scoring_elements |
0.7203 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00703 |
| scoring_system |
epss |
| scoring_elements |
0.72024 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.00703 |
| scoring_system |
epss |
| scoring_elements |
0.7205 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-6164 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-6164, GHSA-gm5x-hpmw-xpxg
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gme6-wj87-ekfw |
|
|
| Fixing_vulnerabilities |
|
| Risk_score | 4.0 |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:composer/silverstripe/cms@4.4.5 |