| 0 |
| url |
VCID-2rbk-47h6-d7d8 |
| vulnerability_id |
VCID-2rbk-47h6-d7d8 |
| summary |
Business Logic Errors in GitHub repository silverstripe/silverstripe-framework |
| references |
|
| fixed_packages |
| 0 |
| url |
pkg:composer/silverstripe/framework@4.10.1 |
| purl |
pkg:composer/silverstripe/framework@4.10.1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-4f9c-aun4-wfep |
|
| 1 |
| vulnerability |
VCID-4x32-t75c-u3bj |
|
| 2 |
| vulnerability |
VCID-5pkg-j4wg-7fcn |
|
| 3 |
| vulnerability |
VCID-6epx-c68d-d7bv |
|
| 4 |
| vulnerability |
VCID-86yd-4mkt-hydr |
|
| 5 |
| vulnerability |
VCID-a3yc-fxa1-gfhy |
|
| 6 |
| vulnerability |
VCID-axxx-gpfn-mqc9 |
|
| 7 |
| vulnerability |
VCID-cfgg-fgjt-z3hn |
|
| 8 |
| vulnerability |
VCID-d5q3-jrdb-euav |
|
| 9 |
| vulnerability |
VCID-ftdr-uzuh-8ybc |
|
| 10 |
| vulnerability |
VCID-kak1-btjp-kqgz |
|
| 11 |
| vulnerability |
VCID-kd3t-2gzd-q3hq |
|
| 12 |
| vulnerability |
VCID-kgm4-g26x-gken |
|
| 13 |
| vulnerability |
VCID-kvhv-9fj5-7kgk |
|
| 14 |
| vulnerability |
VCID-kw9p-5fbc-hudg |
|
| 15 |
| vulnerability |
VCID-kxa8-dmva-ayff |
|
| 16 |
| vulnerability |
VCID-qjgf-hxng-j3g9 |
|
| 17 |
| vulnerability |
VCID-qm38-1cwk-b3hq |
|
| 18 |
| vulnerability |
VCID-ua49-snhx-dqa4 |
|
| 19 |
| vulnerability |
VCID-w4fh-cpaq-nqat |
|
| 20 |
| vulnerability |
VCID-yuer-yn1w-q3gw |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:composer/silverstripe/framework@4.10.1 |
|
|
| aliases |
CVE-2022-0227, GHSA-32m2-9f76-4gv8
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2rbk-47h6-d7d8 |
|
| 1 |
| url |
VCID-4f9c-aun4-wfep |
| vulnerability_id |
VCID-4f9c-aun4-wfep |
| summary |
Missing Authorization
Silverstripe Framework is the Model-View-Controller framework that powers the Silverstripe content management system. Prior to version 4.12.15, the GridField print view incorrectly validates the permission of DataObjects potentially allowing a content author to view records they are not authorised to access. Users should upgrade to Silverstripe Framework 4.12.15 or above to address the issue. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-22728 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00457 |
| scoring_system |
epss |
| scoring_elements |
0.63885 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00457 |
| scoring_system |
epss |
| scoring_elements |
0.63903 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00457 |
| scoring_system |
epss |
| scoring_elements |
0.63936 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00457 |
| scoring_system |
epss |
| scoring_elements |
0.63949 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00457 |
| scoring_system |
epss |
| scoring_elements |
0.63937 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00457 |
| scoring_system |
epss |
| scoring_elements |
0.63919 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00457 |
| scoring_system |
epss |
| scoring_elements |
0.63869 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00457 |
| scoring_system |
epss |
| scoring_elements |
0.63911 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-22728 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-22728, GHSA-jh3w-6jp2-vqqm
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4f9c-aun4-wfep |
|
| 2 |
| url |
VCID-4x32-t75c-u3bj |
| vulnerability_id |
VCID-4x32-t75c-u3bj |
| summary |
Silverstipe CMS Stored XSS in custom meta tags
A malicious content author could create a custom meta tag and execute an arbitrary JavaScript payload. This would require convincing a legitimate user to access a page and enter a custom keyboard shortcut.
This requires CMS access to exploit. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-37421 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00322 |
| scoring_system |
epss |
| scoring_elements |
0.55233 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00322 |
| scoring_system |
epss |
| scoring_elements |
0.55208 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00322 |
| scoring_system |
epss |
| scoring_elements |
0.55232 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00322 |
| scoring_system |
epss |
| scoring_elements |
0.5521 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00322 |
| scoring_system |
epss |
| scoring_elements |
0.55259 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00322 |
| scoring_system |
epss |
| scoring_elements |
0.5526 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00322 |
| scoring_system |
epss |
| scoring_elements |
0.55272 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00322 |
| scoring_system |
epss |
| scoring_elements |
0.55251 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-37421 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:composer/silverstripe/framework@4.11.3 |
| purl |
pkg:composer/silverstripe/framework@4.11.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-4f9c-aun4-wfep |
|
| 1 |
| vulnerability |
VCID-5pkg-j4wg-7fcn |
|
| 2 |
| vulnerability |
VCID-6epx-c68d-d7bv |
|
| 3 |
| vulnerability |
VCID-86yd-4mkt-hydr |
|
| 4 |
| vulnerability |
VCID-a3yc-fxa1-gfhy |
|
| 5 |
| vulnerability |
VCID-axxx-gpfn-mqc9 |
|
| 6 |
| vulnerability |
VCID-cfgg-fgjt-z3hn |
|
| 7 |
| vulnerability |
VCID-d5q3-jrdb-euav |
|
| 8 |
| vulnerability |
VCID-ftdr-uzuh-8ybc |
|
| 9 |
| vulnerability |
VCID-kak1-btjp-kqgz |
|
| 10 |
| vulnerability |
VCID-kgm4-g26x-gken |
|
| 11 |
| vulnerability |
VCID-kvhv-9fj5-7kgk |
|
| 12 |
| vulnerability |
VCID-kw9p-5fbc-hudg |
|
| 13 |
| vulnerability |
VCID-qjgf-hxng-j3g9 |
|
| 14 |
| vulnerability |
VCID-qm38-1cwk-b3hq |
|
| 15 |
| vulnerability |
VCID-ua49-snhx-dqa4 |
|
| 16 |
| vulnerability |
VCID-yuer-yn1w-q3gw |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:composer/silverstripe/framework@4.11.3 |
|
|
| aliases |
CVE-2022-37421, GHSA-pp74-g2q5-j4jf, GMS-2022-6855
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4x32-t75c-u3bj |
|
| 3 |
| url |
VCID-5pkg-j4wg-7fcn |
| vulnerability_id |
VCID-5pkg-j4wg-7fcn |
| summary |
Improper Input Validation
Silverstripe Framework is the MVC framework that powers Silverstripe CMS. When a new member record is created and a password is not set, an empty encrypted password is generated. As a result, if someone is aware of the existence of a member record associated with a specific email address, they can potentially attempt to log in using that empty password. Although the default member authenticator and login form require a non-empty password, alternative authentication methods might still permit a successful login with the empty password. This issue has been patched in versions 4.13.4 and 5.0.13. |
| references |
|
| fixed_packages |
|
| aliases |
CVE-2023-32302, GHSA-36xx-7vf6-7mv3
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5pkg-j4wg-7fcn |
|
| 4 |
| url |
VCID-6epx-c68d-d7bv |
| vulnerability_id |
VCID-6epx-c68d-d7bv |
| summary |
Silverstripe Framework has a XSS in form messages
In some cases, form messages can contain HTML markup. This is an intentional feature, allowing links and other relevant HTML markup for the given message.
Some form messages include content that the user can provide. There are scenarios in the CMS where that content doesn't get correctly sanitised prior to being included in the form message, resulting in an XSS vulnerability.
### References
- https://www.silverstripe.org/download/security-releases/cve-2024-53277
## Reported by
Leo Diamat from [Bastion Security Group](http://www.bastionsecurity.co.nz/) |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-53277 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01074 |
| scoring_system |
epss |
| scoring_elements |
0.77739 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.01074 |
| scoring_system |
epss |
| scoring_elements |
0.77755 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.01074 |
| scoring_system |
epss |
| scoring_elements |
0.7775 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.01074 |
| scoring_system |
epss |
| scoring_elements |
0.77722 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01074 |
| scoring_system |
epss |
| scoring_elements |
0.77712 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.01074 |
| scoring_system |
epss |
| scoring_elements |
0.77765 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.01074 |
| scoring_system |
epss |
| scoring_elements |
0.77781 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-53277 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-53277, GHSA-ff6q-3c9c-6cf5
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6epx-c68d-d7bv |
|
| 5 |
| url |
VCID-86yd-4mkt-hydr |
| vulnerability_id |
VCID-86yd-4mkt-hydr |
| summary |
Record titles for restricted records can be viewed if exposed by GridFieldAddExistingAutocompleter
### Impact
If a user should not be able to see a record, but that record can be added to a `GridField` using the `GridFieldAddExistingAutocompleter` component, the record's title can be accessed by that user.
**Base CVSS:** [4.3](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:F/RL:O/RC:C&version=3.1)
**Reported by:** Nick K - LittleMonkey, [littlemonkey.co.nz](http://littlemonkey.co.nz/)
### References
- https://www.silverstripe.org/download/security-releases/CVE-2023-48714 |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-48714 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00226 |
| scoring_system |
epss |
| scoring_elements |
0.45378 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.00226 |
| scoring_system |
epss |
| scoring_elements |
0.45371 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00226 |
| scoring_system |
epss |
| scoring_elements |
0.45369 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00226 |
| scoring_system |
epss |
| scoring_elements |
0.454 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00226 |
| scoring_system |
epss |
| scoring_elements |
0.45359 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00226 |
| scoring_system |
epss |
| scoring_elements |
0.45379 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00226 |
| scoring_system |
epss |
| scoring_elements |
0.45323 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-48714 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-48714, GHSA-qm2j-qvq3-j29v
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-86yd-4mkt-hydr |
|
| 6 |
| url |
VCID-a3yc-fxa1-gfhy |
| vulnerability_id |
VCID-a3yc-fxa1-gfhy |
| summary |
Silverstripe Framework has a XSS vulnerability in HTML editor
### Impact
A bad actor with access to edit content in the CMS could send a specifically crafted encoded payload to the server, which could be used to inject a JavaScript payload on the front end of the site. The payload would be sanitised on the client-side, but server-side sanitisation doesn't catch it.
The server-side sanitisation logic has been updated to sanitise against this attack.
### Reported by
James Nicoll from Fujitsu Cyber
### References
- https://www.silverstripe.org/download/security-releases/cve-2025-30148 |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-30148 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00167 |
| scoring_system |
epss |
| scoring_elements |
0.37948 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00167 |
| scoring_system |
epss |
| scoring_elements |
0.37914 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00167 |
| scoring_system |
epss |
| scoring_elements |
0.37901 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00167 |
| scoring_system |
epss |
| scoring_elements |
0.37851 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00167 |
| scoring_system |
epss |
| scoring_elements |
0.37974 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00167 |
| scoring_system |
epss |
| scoring_elements |
0.37868 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00167 |
| scoring_system |
epss |
| scoring_elements |
0.37893 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00167 |
| scoring_system |
epss |
| scoring_elements |
0.37929 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-30148 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-30148, GHSA-rhx4-hvx9-j387
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-a3yc-fxa1-gfhy |
|
| 7 |
| url |
VCID-axxx-gpfn-mqc9 |
| vulnerability_id |
VCID-axxx-gpfn-mqc9 |
| summary |
Silverstripe Framework has a Reflected Cross Site Scripting (XSS) in error message
> [!IMPORTANT]
> This vulnerability only affects sites which are in the "dev" environment mode. If your production website is in "dev" mode, it has been misconfigured, and you should immediately swap it to "live" mode.
> See https://docs.silverstripe.org/en/developer_guides/debugging/environment_types/ for more information.
If a website has been set to the "dev" environment mode, a URL can be provided which includes an XSS payload which will be executed in the resulting error message.
## References
- https://www.silverstripe.org/download/security-releases/ss-2024-002
## Reported by
Gaurav Nayak from [Chaleit](https://chaleit.com/) |
| references |
|
| fixed_packages |
|
| aliases |
GHSA-mqf3-qpc3-g26q
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-axxx-gpfn-mqc9 |
|
| 8 |
| url |
VCID-cfgg-fgjt-z3hn |
| vulnerability_id |
VCID-cfgg-fgjt-z3hn |
| summary |
Blind SQL Injection via GridFieldSortableHeader
Gridfield state is vulnerable to SQL injections. The vast majority of Gridfields in Silverstripe CMS are affected by this vulnerability.
An attacker with CMS access could execute an arbitrary SQL statement by adding an SQL payload in some parts of the GridField state. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-38148 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00292 |
| scoring_system |
epss |
| scoring_elements |
0.52579 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.00292 |
| scoring_system |
epss |
| scoring_elements |
0.52585 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00292 |
| scoring_system |
epss |
| scoring_elements |
0.52598 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00292 |
| scoring_system |
epss |
| scoring_elements |
0.52539 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00292 |
| scoring_system |
epss |
| scoring_elements |
0.52566 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00292 |
| scoring_system |
epss |
| scoring_elements |
0.52533 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00292 |
| scoring_system |
epss |
| scoring_elements |
0.52613 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00292 |
| scoring_system |
epss |
| scoring_elements |
0.52629 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-38148 |
|
| 1 |
| reference_url |
https://forum.silverstripe.org/c/releases |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
8.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-30T15:26:27Z/ |
|
|
| url |
https://forum.silverstripe.org/c/releases |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://www.silverstripe.org/blog/tag/release |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
8.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-30T15:26:27Z/ |
|
|
| url |
https://www.silverstripe.org/blog/tag/release |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-38148, GHSA-rr8h-f97q-8p9c
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cfgg-fgjt-z3hn |
|
| 9 |
| url |
VCID-d5q3-jrdb-euav |
| vulnerability_id |
VCID-d5q3-jrdb-euav |
| summary |
Reflected XSS in querystring parameters
An attacker could inject a XSS payload in a Silverstripe CMS response by carefully crafting a return URL on a /dev/build or /Security/login request.
To exploit this vulnerability, an attacker would need to convince a user to follow a link with a malicious payload.
This will only affect projects configured to output PHP warnings to the browser. By default, Silverstripe CMS will only output PHP warnings if your SS_ENVIRONMENT_TYPE environment variable is set to dev. Production sites should always set SS_ENVIRONMENT_TYPE to live. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-38462 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0068 |
| scoring_system |
epss |
| scoring_elements |
0.71558 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.0068 |
| scoring_system |
epss |
| scoring_elements |
0.7157 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.0068 |
| scoring_system |
epss |
| scoring_elements |
0.71589 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.0068 |
| scoring_system |
epss |
| scoring_elements |
0.71604 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.0068 |
| scoring_system |
epss |
| scoring_elements |
0.71581 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.0068 |
| scoring_system |
epss |
| scoring_elements |
0.7154 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.0068 |
| scoring_system |
epss |
| scoring_elements |
0.71571 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.0068 |
| scoring_system |
epss |
| scoring_elements |
0.71531 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-38462 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-38462, GHSA-vvxf-r4vm-2vm6, GMS-2022-6858
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-d5q3-jrdb-euav |
|
| 10 |
| url |
VCID-ftdr-uzuh-8ybc |
| vulnerability_id |
VCID-ftdr-uzuh-8ybc |
| summary |
Silverstripe XSS in shortcodes
A malicious content author could add arbitrary attributes to HTML editor shortcodes which could be used to inject a JavaScript payload on the front end of the site. The shortcode providers that ship with Silverstripe CMS have been reviewed and attribute whitelists have been implemented where appropriate to negate this risk. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-38724 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00322 |
| scoring_system |
epss |
| scoring_elements |
0.55232 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00322 |
| scoring_system |
epss |
| scoring_elements |
0.55233 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00322 |
| scoring_system |
epss |
| scoring_elements |
0.55251 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00322 |
| scoring_system |
epss |
| scoring_elements |
0.55208 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00322 |
| scoring_system |
epss |
| scoring_elements |
0.55272 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00322 |
| scoring_system |
epss |
| scoring_elements |
0.5526 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00322 |
| scoring_system |
epss |
| scoring_elements |
0.55259 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00322 |
| scoring_system |
epss |
| scoring_elements |
0.5521 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-38724 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-38724, GHSA-9cx2-hj6m-fv58, GMS-2022-6853, GMS-2022-6856
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ftdr-uzuh-8ybc |
|
| 11 |
| url |
VCID-kak1-btjp-kqgz |
| vulnerability_id |
VCID-kak1-btjp-kqgz |
| summary |
Silverstripe uses TinyMCE which allows svg files linked in object tags
### Impact
TinyMCE v6 has a configuration value `convert_unsafe_embeds` set to `false` which allows svg files containing javascript to be used in `<object>` or `<embed>` tags, which can be used as a vector for XSS attacks.
Note that `<embed>` tags are not allowed by default.
After patching the default value of `convert_unsafe_embeds` will be set to `true`. This means that `<object>` tags will be converted to iframes instead the next time the page is saved, which may break any pages that rely upon previously saved `<object>` tags. Developers can override this configuration if desired to revert to the original behaviour.
We reviewed the potential impact of this vulnerability within the context of Silverstripe CMS. We concluded this is a medium impact vulnerability given how TinyMCE is used by Silverstripe CMS.
### References:
- https://www.silverstripe.org/download/security-releases/ss-2024-001
- https://github.com/advisories/GHSA-5359-pvf2-pw78 |
| references |
|
| fixed_packages |
|
| aliases |
GHSA-52cw-pvq9-9m5v
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kak1-btjp-kqgz |
|
| 12 |
| url |
VCID-kd3t-2gzd-q3hq |
| vulnerability_id |
VCID-kd3t-2gzd-q3hq |
| summary |
Stored XSS via HTML fields in SilverStripe Framework
SilverStripe Framework through 4.10.8 allows XSS, inside of script tags that can can be added to website content via XHR by an authenticated CMS user if the cwp-core module is not installed on the sanitise_server_side contig is not set to true in project code. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-25238 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00338 |
| scoring_system |
epss |
| scoring_elements |
0.56638 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00338 |
| scoring_system |
epss |
| scoring_elements |
0.56657 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00338 |
| scoring_system |
epss |
| scoring_elements |
0.56678 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00338 |
| scoring_system |
epss |
| scoring_elements |
0.56695 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00338 |
| scoring_system |
epss |
| scoring_elements |
0.5669 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00338 |
| scoring_system |
epss |
| scoring_elements |
0.5666 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00338 |
| scoring_system |
epss |
| scoring_elements |
0.56703 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-25238 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:composer/silverstripe/framework@4.10.9 |
| purl |
pkg:composer/silverstripe/framework@4.10.9 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-4f9c-aun4-wfep |
|
| 1 |
| vulnerability |
VCID-4x32-t75c-u3bj |
|
| 2 |
| vulnerability |
VCID-5pkg-j4wg-7fcn |
|
| 3 |
| vulnerability |
VCID-6epx-c68d-d7bv |
|
| 4 |
| vulnerability |
VCID-86yd-4mkt-hydr |
|
| 5 |
| vulnerability |
VCID-a3yc-fxa1-gfhy |
|
| 6 |
| vulnerability |
VCID-axxx-gpfn-mqc9 |
|
| 7 |
| vulnerability |
VCID-cfgg-fgjt-z3hn |
|
| 8 |
| vulnerability |
VCID-d5q3-jrdb-euav |
|
| 9 |
| vulnerability |
VCID-ftdr-uzuh-8ybc |
|
| 10 |
| vulnerability |
VCID-kak1-btjp-kqgz |
|
| 11 |
| vulnerability |
VCID-kgm4-g26x-gken |
|
| 12 |
| vulnerability |
VCID-kvhv-9fj5-7kgk |
|
| 13 |
| vulnerability |
VCID-kw9p-5fbc-hudg |
|
| 14 |
| vulnerability |
VCID-qjgf-hxng-j3g9 |
|
| 15 |
| vulnerability |
VCID-qm38-1cwk-b3hq |
|
| 16 |
| vulnerability |
VCID-ua49-snhx-dqa4 |
|
| 17 |
| vulnerability |
VCID-yuer-yn1w-q3gw |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:composer/silverstripe/framework@4.10.9 |
|
|
| aliases |
CVE-2022-25238, GHSA-jx34-gqqq-r6gm
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kd3t-2gzd-q3hq |
|
| 13 |
| url |
VCID-kgm4-g26x-gken |
| vulnerability_id |
VCID-kgm4-g26x-gken |
| summary |
Stored XSS using HTMLEditor
A malicious content author could add a JavaScript payload to the href attribute of a link by splitting a javascript URL with white space characters.
An attacker must have access to the CMS to exploit this issue. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-37429 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00322 |
| scoring_system |
epss |
| scoring_elements |
0.55233 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00322 |
| scoring_system |
epss |
| scoring_elements |
0.55208 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00322 |
| scoring_system |
epss |
| scoring_elements |
0.55232 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00322 |
| scoring_system |
epss |
| scoring_elements |
0.5521 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00322 |
| scoring_system |
epss |
| scoring_elements |
0.55259 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00322 |
| scoring_system |
epss |
| scoring_elements |
0.5526 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00322 |
| scoring_system |
epss |
| scoring_elements |
0.55272 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00322 |
| scoring_system |
epss |
| scoring_elements |
0.55251 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-37429 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-37429, GHSA-wc6r-4ggc-79w5, GMS-2022-6859
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kgm4-g26x-gken |
|
| 14 |
| url |
VCID-kvhv-9fj5-7kgk |
| vulnerability_id |
VCID-kvhv-9fj5-7kgk |
| summary |
Silverstripe Framework has a XSS via insert media remote file oembed
### Impact
When using the "insert media" functionality, the linked oEmbed JSON includes an HTML attribute which will replace the embed shortcode. The HTML is not sanitized before replacing the shortcode, allowing a script payload to be executed on both the CMS and the front-end of the website.
## References
- https://www.silverstripe.org/download/security-releases/cve-2024-47605
## Reported by
James Nicoll from [Fujitsu Cyber Security Services](https://www.fujitsu.com/nz/services/security/) |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-47605 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0398 |
| scoring_system |
epss |
| scoring_elements |
0.88367 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.0398 |
| scoring_system |
epss |
| scoring_elements |
0.884 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.0398 |
| scoring_system |
epss |
| scoring_elements |
0.88408 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.0398 |
| scoring_system |
epss |
| scoring_elements |
0.88397 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.0398 |
| scoring_system |
epss |
| scoring_elements |
0.88391 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0398 |
| scoring_system |
epss |
| scoring_elements |
0.88372 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.0398 |
| scoring_system |
epss |
| scoring_elements |
0.88353 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-47605 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-47605, GHSA-7cmp-cgg8-4c82
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kvhv-9fj5-7kgk |
|
| 15 |
| url |
VCID-kw9p-5fbc-hudg |
| vulnerability_id |
VCID-kw9p-5fbc-hudg |
| summary |
Reflected Cross Site Scripting (XSS) in error message
If a website has been set to the "dev" environment mode, a URL can be provided which includes an XSS payload which will be executed in the resulting error message. |
| references |
|
| fixed_packages |
|
| aliases |
GHSA-74j9-xhqr-6qv3
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kw9p-5fbc-hudg |
|
| 16 |
| url |
VCID-kxa8-dmva-ayff |
| vulnerability_id |
VCID-kxa8-dmva-ayff |
| summary |
Quadratic blowup in Convert::xml2array()
Silverstripe silverstripe/framework 4.x until 4.10.9 has a quadratic blowup in Convert::xml2array() that enables a remote attack via a crafted XML document. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-41559 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57282 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57393 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57411 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57432 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57417 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57414 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57363 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57387 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00348 |
| scoring_system |
epss |
| scoring_elements |
0.57364 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-41559 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:composer/silverstripe/framework@4.10.9 |
| purl |
pkg:composer/silverstripe/framework@4.10.9 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-4f9c-aun4-wfep |
|
| 1 |
| vulnerability |
VCID-4x32-t75c-u3bj |
|
| 2 |
| vulnerability |
VCID-5pkg-j4wg-7fcn |
|
| 3 |
| vulnerability |
VCID-6epx-c68d-d7bv |
|
| 4 |
| vulnerability |
VCID-86yd-4mkt-hydr |
|
| 5 |
| vulnerability |
VCID-a3yc-fxa1-gfhy |
|
| 6 |
| vulnerability |
VCID-axxx-gpfn-mqc9 |
|
| 7 |
| vulnerability |
VCID-cfgg-fgjt-z3hn |
|
| 8 |
| vulnerability |
VCID-d5q3-jrdb-euav |
|
| 9 |
| vulnerability |
VCID-ftdr-uzuh-8ybc |
|
| 10 |
| vulnerability |
VCID-kak1-btjp-kqgz |
|
| 11 |
| vulnerability |
VCID-kgm4-g26x-gken |
|
| 12 |
| vulnerability |
VCID-kvhv-9fj5-7kgk |
|
| 13 |
| vulnerability |
VCID-kw9p-5fbc-hudg |
|
| 14 |
| vulnerability |
VCID-qjgf-hxng-j3g9 |
|
| 15 |
| vulnerability |
VCID-qm38-1cwk-b3hq |
|
| 16 |
| vulnerability |
VCID-ua49-snhx-dqa4 |
|
| 17 |
| vulnerability |
VCID-yuer-yn1w-q3gw |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:composer/silverstripe/framework@4.10.9 |
|
| 1 |
|
|
| aliases |
CVE-2021-41559, GHSA-9fmg-89fx-r33w
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kxa8-dmva-ayff |
|
| 17 |
| url |
VCID-qjgf-hxng-j3g9 |
| vulnerability_id |
VCID-qjgf-hxng-j3g9 |
| summary |
Silverstripe Framework user enumeration via timing attack on login and password reset forms
### Impact
User enumeration is possible by performing a timing attack on the login or password reset pages with user credentials.
This was originally disclosed in https://www.silverstripe.org/download/security-releases/ss-2017-005/ for CMS 3 but was not patched in CMS 4+
### References
- https://www.silverstripe.org/download/security-releases/ss-2017-005
- https://www.silverstripe.org/download/security-releases/ss-2025-001 |
| references |
|
| fixed_packages |
|
| aliases |
GHSA-256q-hx8w-xcqx
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qjgf-hxng-j3g9 |
|
| 18 |
| url |
VCID-qm38-1cwk-b3hq |
| vulnerability_id |
VCID-qm38-1cwk-b3hq |
| summary |
URL Redirection to Untrusted Site ('Open Redirect')
Silverstripe Framework is the Model-View-Controller framework that powers the Silverstripe content management system. Prior to version 4.12.15, an attacker can display a link to a third party website on a login screen by convincing a legitimate content author to follow a specially crafted link. Users should upgrade to Silverstripe Framework 4.12.15 or above to address the issue. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-22729 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00262 |
| scoring_system |
epss |
| scoring_elements |
0.49576 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00262 |
| scoring_system |
epss |
| scoring_elements |
0.49621 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00262 |
| scoring_system |
epss |
| scoring_elements |
0.49609 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00262 |
| scoring_system |
epss |
| scoring_elements |
0.49554 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00262 |
| scoring_system |
epss |
| scoring_elements |
0.49603 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00262 |
| scoring_system |
epss |
| scoring_elements |
0.49593 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00262 |
| scoring_system |
epss |
| scoring_elements |
0.49592 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-22729 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-22729, GHSA-fw84-xgm8-9jmv
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qm38-1cwk-b3hq |
|
| 19 |
| url |
VCID-tc2y-zrea-vyb2 |
| vulnerability_id |
VCID-tc2y-zrea-vyb2 |
| summary |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
SilverStripe Framework suffers from a XSS vulnerablity. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-36150 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00372 |
| scoring_system |
epss |
| scoring_elements |
0.5896 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00372 |
| scoring_system |
epss |
| scoring_elements |
0.58857 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00372 |
| scoring_system |
epss |
| scoring_elements |
0.58932 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00372 |
| scoring_system |
epss |
| scoring_elements |
0.58954 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00372 |
| scoring_system |
epss |
| scoring_elements |
0.5892 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00372 |
| scoring_system |
epss |
| scoring_elements |
0.58972 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00372 |
| scoring_system |
epss |
| scoring_elements |
0.58978 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00372 |
| scoring_system |
epss |
| scoring_elements |
0.58997 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00372 |
| scoring_system |
epss |
| scoring_elements |
0.58979 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-36150 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:composer/silverstripe/framework@4.9.0-alpha1 |
| purl |
pkg:composer/silverstripe/framework@4.9.0-alpha1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2rbk-47h6-d7d8 |
|
| 1 |
| vulnerability |
VCID-4f9c-aun4-wfep |
|
| 2 |
| vulnerability |
VCID-4x32-t75c-u3bj |
|
| 3 |
| vulnerability |
VCID-5pkg-j4wg-7fcn |
|
| 4 |
| vulnerability |
VCID-6epx-c68d-d7bv |
|
| 5 |
| vulnerability |
VCID-86yd-4mkt-hydr |
|
| 6 |
| vulnerability |
VCID-a3yc-fxa1-gfhy |
|
| 7 |
| vulnerability |
VCID-axxx-gpfn-mqc9 |
|
| 8 |
| vulnerability |
VCID-cfgg-fgjt-z3hn |
|
| 9 |
| vulnerability |
VCID-d5q3-jrdb-euav |
|
| 10 |
| vulnerability |
VCID-ftdr-uzuh-8ybc |
|
| 11 |
| vulnerability |
VCID-kak1-btjp-kqgz |
|
| 12 |
| vulnerability |
VCID-kd3t-2gzd-q3hq |
|
| 13 |
| vulnerability |
VCID-kgm4-g26x-gken |
|
| 14 |
| vulnerability |
VCID-kvhv-9fj5-7kgk |
|
| 15 |
| vulnerability |
VCID-kw9p-5fbc-hudg |
|
| 16 |
| vulnerability |
VCID-kxa8-dmva-ayff |
|
| 17 |
| vulnerability |
VCID-qjgf-hxng-j3g9 |
|
| 18 |
| vulnerability |
VCID-qm38-1cwk-b3hq |
|
| 19 |
| vulnerability |
VCID-ua49-snhx-dqa4 |
|
| 20 |
| vulnerability |
VCID-w4fh-cpaq-nqat |
|
| 21 |
| vulnerability |
VCID-yuer-yn1w-q3gw |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:composer/silverstripe/framework@4.9.0-alpha1 |
|
| 1 |
| url |
pkg:composer/silverstripe/framework@4.9.0 |
| purl |
pkg:composer/silverstripe/framework@4.9.0 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2rbk-47h6-d7d8 |
|
| 1 |
| vulnerability |
VCID-4f9c-aun4-wfep |
|
| 2 |
| vulnerability |
VCID-4x32-t75c-u3bj |
|
| 3 |
| vulnerability |
VCID-5pkg-j4wg-7fcn |
|
| 4 |
| vulnerability |
VCID-6epx-c68d-d7bv |
|
| 5 |
| vulnerability |
VCID-86yd-4mkt-hydr |
|
| 6 |
| vulnerability |
VCID-a3yc-fxa1-gfhy |
|
| 7 |
| vulnerability |
VCID-axxx-gpfn-mqc9 |
|
| 8 |
| vulnerability |
VCID-cfgg-fgjt-z3hn |
|
| 9 |
| vulnerability |
VCID-d5q3-jrdb-euav |
|
| 10 |
| vulnerability |
VCID-ftdr-uzuh-8ybc |
|
| 11 |
| vulnerability |
VCID-kak1-btjp-kqgz |
|
| 12 |
| vulnerability |
VCID-kd3t-2gzd-q3hq |
|
| 13 |
| vulnerability |
VCID-kgm4-g26x-gken |
|
| 14 |
| vulnerability |
VCID-kvhv-9fj5-7kgk |
|
| 15 |
| vulnerability |
VCID-kw9p-5fbc-hudg |
|
| 16 |
| vulnerability |
VCID-kxa8-dmva-ayff |
|
| 17 |
| vulnerability |
VCID-qjgf-hxng-j3g9 |
|
| 18 |
| vulnerability |
VCID-qm38-1cwk-b3hq |
|
| 19 |
| vulnerability |
VCID-ua49-snhx-dqa4 |
|
| 20 |
| vulnerability |
VCID-w4fh-cpaq-nqat |
|
| 21 |
| vulnerability |
VCID-yuer-yn1w-q3gw |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:composer/silverstripe/framework@4.9.0 |
|
|
| aliases |
CVE-2021-36150, GHSA-j66h-cc96-c32q
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tc2y-zrea-vyb2 |
|
| 20 |
| url |
VCID-ua49-snhx-dqa4 |
| vulnerability_id |
VCID-ua49-snhx-dqa4 |
| summary |
Stored XSS using uppercase characters in HTMLEditor
A malicious content author could add a Javascript payload to the href attribute of a link. A similar issue was identified and fixed via CVE-2022-28803. However, the fix didn't account for the casing of the href attribute. An attacker must have access to the CMS to exploit this issue. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-37430 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00322 |
| scoring_system |
epss |
| scoring_elements |
0.55233 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00322 |
| scoring_system |
epss |
| scoring_elements |
0.55208 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00322 |
| scoring_system |
epss |
| scoring_elements |
0.55232 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00322 |
| scoring_system |
epss |
| scoring_elements |
0.5521 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00322 |
| scoring_system |
epss |
| scoring_elements |
0.55259 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00322 |
| scoring_system |
epss |
| scoring_elements |
0.5526 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00322 |
| scoring_system |
epss |
| scoring_elements |
0.55272 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00322 |
| scoring_system |
epss |
| scoring_elements |
0.55251 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-37430 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-37430, GHSA-qw4w-vq8v-2wcv, GMS-2022-6857
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ua49-snhx-dqa4 |
|
| 21 |
| url |
VCID-w4fh-cpaq-nqat |
| vulnerability_id |
VCID-w4fh-cpaq-nqat |
| summary |
Stored XSS in link tags added via XHR in SilverStripe Framework
SilverStripe Framework 4.x prior to 4.10.9 is vulnerable to cross-site scripting inside the href attribute of an HTML hyperlink, which can be added to website content via XMLHttpRequest (XHR) by an authenticated CMS user. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-28803 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35434 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35512 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35537 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35419 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35465 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35489 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35499 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35456 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-28803 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:composer/silverstripe/framework@4.10.9 |
| purl |
pkg:composer/silverstripe/framework@4.10.9 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-4f9c-aun4-wfep |
|
| 1 |
| vulnerability |
VCID-4x32-t75c-u3bj |
|
| 2 |
| vulnerability |
VCID-5pkg-j4wg-7fcn |
|
| 3 |
| vulnerability |
VCID-6epx-c68d-d7bv |
|
| 4 |
| vulnerability |
VCID-86yd-4mkt-hydr |
|
| 5 |
| vulnerability |
VCID-a3yc-fxa1-gfhy |
|
| 6 |
| vulnerability |
VCID-axxx-gpfn-mqc9 |
|
| 7 |
| vulnerability |
VCID-cfgg-fgjt-z3hn |
|
| 8 |
| vulnerability |
VCID-d5q3-jrdb-euav |
|
| 9 |
| vulnerability |
VCID-ftdr-uzuh-8ybc |
|
| 10 |
| vulnerability |
VCID-kak1-btjp-kqgz |
|
| 11 |
| vulnerability |
VCID-kgm4-g26x-gken |
|
| 12 |
| vulnerability |
VCID-kvhv-9fj5-7kgk |
|
| 13 |
| vulnerability |
VCID-kw9p-5fbc-hudg |
|
| 14 |
| vulnerability |
VCID-qjgf-hxng-j3g9 |
|
| 15 |
| vulnerability |
VCID-qm38-1cwk-b3hq |
|
| 16 |
| vulnerability |
VCID-ua49-snhx-dqa4 |
|
| 17 |
| vulnerability |
VCID-yuer-yn1w-q3gw |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:composer/silverstripe/framework@4.10.9 |
|
|
| aliases |
CVE-2022-28803, GHSA-rppc-655v-7j3c
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-w4fh-cpaq-nqat |
|
| 22 |
| url |
VCID-yuer-yn1w-q3gw |
| vulnerability_id |
VCID-yuer-yn1w-q3gw |
| summary |
Silverstripe Framework has a Cross-site Scripting vulnerability with encoded payload
### Impact
A bad actor with access to edit content in the CMS could send a specifically crafted encoded payload to the server, which could be used to inject a JavaScript payload on the front end of the site. The payload would be sanitised on the client-side, but server-side sanitisation doesn't catch it.
The server-side sanitisation logic has been updated to sanitise against this type of attack.
### References
- https://www.silverstripe.org/download/security-releases/cve-2024-32981 |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-32981 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0105 |
| scoring_system |
epss |
| scoring_elements |
0.7749 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.0105 |
| scoring_system |
epss |
| scoring_elements |
0.77542 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.0105 |
| scoring_system |
epss |
| scoring_elements |
0.77545 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.0105 |
| scoring_system |
epss |
| scoring_elements |
0.7756 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.0105 |
| scoring_system |
epss |
| scoring_elements |
0.77534 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.0105 |
| scoring_system |
epss |
| scoring_elements |
0.77524 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0105 |
| scoring_system |
epss |
| scoring_elements |
0.77495 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.0105 |
| scoring_system |
epss |
| scoring_elements |
0.77515 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-32981 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-32981, GHSA-chx7-9x8h-r5mg
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yuer-yn1w-q3gw |
|