{"url":"http://public2.vulnerablecode.io/api/packages/20988?format=json","purl":"pkg:composer/silverstripe/cms@3.1.10","type":"composer","namespace":"silverstripe","name":"cms","version":"3.1.10","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"4.11.3","latest_non_vulnerable_version":"4.11.3","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/55376?format=json","vulnerability_id":"VCID-2f9j-ek3x-kbc5","summary":"Silverstripe CMS XSS Vulnerability\nIn SilverStripe through 4.5, malicious users with a valid Silverstripe CMS login (usually CMS access) can craft profile information which can lead to XSS for other users through specially crafted login form URLs.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-9311","reference_id":"","reference_type":"","scores":[{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56878","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56914","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56966","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56969","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56977","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56957","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56934","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56963","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.5696","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56937","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56877","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56895","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56823","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56917","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56939","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-9311"},{"reference_url":"https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/framework/CVE-2020-9311.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/framework/CVE-2020-9311.yaml"},{"reference_url":"https://github.com/silverstripe/silverstripe-cms","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/silverstripe/silverstripe-cms"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-9311","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-9311"},{"reference_url":"https://www.silverstripe.org/download/security-releases/cve-2020-9311","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.silverstripe.org/download/security-releases/cve-2020-9311"},{"reference_url":"https://www.silverstripe.org/download/security-releases/CVE-2020-9311","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.silverstripe.org/download/security-releases/CVE-2020-9311"},{"reference_url":"https://www.silverstripe.org/download/security-releases/cve-2020-9311/","reference_id":"CVE-2020-9311","reference_type":"","scores":[],"url":"https://www.silverstripe.org/download/security-releases/cve-2020-9311/"},{"reference_url":"https://github.com/advisories/GHSA-2pw2-qpcp-m47x","reference_id":"GHSA-2pw2-qpcp-m47x","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-2pw2-qpcp-m47x"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/307444?format=json","purl":"pkg:composer/silverstripe/cms@4.5.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4x32-t75c-u3bj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:composer/silverstripe/cms@4.5.1"}],"aliases":["CVE-2020-9311","GHSA-2pw2-qpcp-m47x"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2f9j-ek3x-kbc5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51108?format=json","vulnerability_id":"VCID-658d-vmwt-f7e8","summary":"Missing warning can lead to unauthenticated admin access in SilverStripe\nIn SilverStripe through 4.3.3, a missing warning about leaving install.php in a public webroot can lead to unauthenticated admin access.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-12204","reference_id":"","reference_type":"","scores":[{"value":"0.00832","scoring_system":"epss","scoring_elements":"0.74526","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00832","scoring_system":"epss","scoring_elements":"0.7465","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00832","scoring_system":"epss","scoring_elements":"0.74553","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00832","scoring_system":"epss","scoring_elements":"0.74522","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00832","scoring_system":"epss","scoring_elements":"0.74648","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00832","scoring_system":"epss","scoring_elements":"0.74642","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00832","scoring_system":"epss","scoring_elements":"0.74606","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00832","scoring_system":"epss","scoring_elements":"0.74615","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00832","scoring_system":"epss","scoring_elements":"0.74607","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00832","scoring_system":"epss","scoring_elements":"0.7457","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00832","scoring_system":"epss","scoring_elements":"0.74578","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00832","scoring_system":"epss","scoring_elements":"0.74598","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00832","scoring_system":"epss","scoring_elements":"0.74575","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00832","scoring_system":"epss","scoring_elements":"0.74559","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00832","scoring_system":"epss","scoring_elements":"0.74527","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-12204"},{"reference_url":"https://forum.silverstripe.org/c/releases","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://forum.silverstripe.org/c/releases"},{"reference_url":"https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/framework/CVE-2019-12204.yaml","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/framework/CVE-2019-12204.yaml"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-12204","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-12204"},{"reference_url":"https://packagist.org/packages/silverstripe/cms","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://packagist.org/packages/silverstripe/cms"},{"reference_url":"https://packagist.org/packages/silverstripe/framework","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://packagist.org/packages/silverstripe/framework"},{"reference_url":"https://www.silverstripe.org/download/security-releases","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.silverstripe.org/download/security-releases"},{"reference_url":"https://www.silverstripe.org/download/security-releases/","reference_id":"","reference_type":"","scores":[],"url":"https://www.silverstripe.org/download/security-releases/"},{"reference_url":"https://www.silverstripe.org/download/security-releases/cve-2019-12204","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.silverstripe.org/download/security-releases/cve-2019-12204"},{"reference_url":"https://www.silverstripe.org/download/security-releases/CVE-2019-12204","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.silverstripe.org/download/security-releases/CVE-2019-12204"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:silverstripe:silverstripe:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:silverstripe:silverstripe:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:silverstripe:silverstripe:*:*:*:*:*:*:*:*"},{"reference_url":"https://www.silverstripe.org/download/security-releases/cve-2019-12204/","reference_id":"CVE-2019-12204","reference_type":"","scores":[],"url":"https://www.silverstripe.org/download/security-releases/cve-2019-12204/"},{"reference_url":"https://github.com/advisories/GHSA-cg8j-8w52-735v","reference_id":"GHSA-cg8j-8w52-735v","reference_type":"","scores":[{"value":"CRITICAL","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-cg8j-8w52-735v"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/568742?format=json","purl":"pkg:composer/silverstripe/cms@4.3.6","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:composer/silverstripe/cms@4.3.6"},{"url":"http://public2.vulnerablecode.io/api/packages/196031?format=json","purl":"pkg:composer/silverstripe/cms@4.4.0-rc1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2f9j-ek3x-kbc5"},{"vulnerability":"VCID-4x32-t75c-u3bj"},{"vulnerability":"VCID-g366-c4n9-vfcs"},{"vulnerability":"VCID-gme6-wj87-ekfw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:composer/silverstripe/cms@4.4.0-rc1"},{"url":"http://public2.vulnerablecode.io/api/packages/79068?format=json","purl":"pkg:composer/silverstripe/cms@4.4.4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2f9j-ek3x-kbc5"},{"vulnerability":"VCID-4x32-t75c-u3bj"},{"vulnerability":"VCID-g366-c4n9-vfcs"},{"vulnerability":"VCID-gme6-wj87-ekfw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:composer/silverstripe/cms@4.4.4"}],"aliases":["CVE-2019-12204","GHSA-cg8j-8w52-735v"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-658d-vmwt-f7e8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/7318?format=json","vulnerability_id":"VCID-agbu-v7vd-fyc8","summary":"Hostname, IP and Protocol Spoofing through HTTP Headers\nIn it's default configuration, SilverStripe trusts all originating IPs to include HTTP headers for Hostname, IP and Protocol. This enables reverse proxies to forward requests while still retaining the original request information. Trusted IPs can be limited via the `SS_TRUSTED_PROXY_IPS` constant. Even with this restriction in place, SilverStripe trusts a variety of HTTP headers due to different proxy notations (e.g. `X-Forwarded-For` vs. `Client-IP`). Unless a proxy explicitly unsets invalid HTTP headers from connecting clients, this can lead to spoofing requests being passed through trusted proxies. The impact of spoofed headers can include `Director::forceSSL()` not being enforced, SS_HTTPRequest->getIP() returning a wrong IP (disabling any IP restrictions), and spoofed hostnames circumventing any hostname-specific restrictions enforced in SilverStripe Controllers. Regardless on running a reverse proxy in your hosting infrastructure, please follow the instructions on Secure Coding: Request hostname forgery in order to opt-in to these protections. If your website is not behind a reverse proxy, you might already be protected if using Apache with mod_env enabled, and you have the following line in your .htaccess file: `SetEnv BlockUntrustedIPs true`.","references":[{"reference_url":"http://www.silverstripe.org/download/security-releases/ss-2016-003/","reference_id":"","reference_type":"","scores":[],"url":"http://www.silverstripe.org/download/security-releases/ss-2016-003/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/21821?format=json","purl":"pkg:composer/silverstripe/cms@3.1.17","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2f9j-ek3x-kbc5"},{"vulnerability":"VCID-658d-vmwt-f7e8"},{"vulnerability":"VCID-c3vp-kc9a-vkhn"},{"vulnerability":"VCID-g366-c4n9-vfcs"},{"vulnerability":"VCID-gme6-wj87-ekfw"},{"vulnerability":"VCID-j6ze-f76y-cqgy"},{"vulnerability":"VCID-kdyk-rrrr-pufw"},{"vulnerability":"VCID-wpu5-3h5v-wuhj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:composer/silverstripe/cms@3.1.17"},{"url":"http://public2.vulnerablecode.io/api/packages/21822?format=json","purl":"pkg:composer/silverstripe/cms@3.2.2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2f9j-ek3x-kbc5"},{"vulnerability":"VCID-658d-vmwt-f7e8"},{"vulnerability":"VCID-c3vp-kc9a-vkhn"},{"vulnerability":"VCID-g366-c4n9-vfcs"},{"vulnerability":"VCID-gme6-wj87-ekfw"},{"vulnerability":"VCID-j6ze-f76y-cqgy"},{"vulnerability":"VCID-kdyk-rrrr-pufw"},{"vulnerability":"VCID-wpu5-3h5v-wuhj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:composer/silverstripe/cms@3.2.2"},{"url":"http://public2.vulnerablecode.io/api/packages/21823?format=json","purl":"pkg:composer/silverstripe/cms@3.3.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2f9j-ek3x-kbc5"},{"vulnerability":"VCID-658d-vmwt-f7e8"},{"vulnerability":"VCID-c3vp-kc9a-vkhn"},{"vulnerability":"VCID-g366-c4n9-vfcs"},{"vulnerability":"VCID-gme6-wj87-ekfw"},{"vulnerability":"VCID-j6ze-f76y-cqgy"},{"vulnerability":"VCID-kdyk-rrrr-pufw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:composer/silverstripe/cms@3.3.0"}],"aliases":["SS-2016-003"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-agbu-v7vd-fyc8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/8179?format=json","vulnerability_id":"VCID-c3vp-kc9a-vkhn","summary":"Cross-site Scripting\nSilverStripe CMS has an XSS via an SVG document that is mishandled by (1) the Insert Media option in the content editor or (2) an `admin/assets/add` pathname.","references":[{"reference_url":"http://lists.openwall.net/full-disclosure/2017/09/14/2","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.openwall.net/full-disclosure/2017/09/14/2"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14498","reference_id":"","reference_type":"","scores":[{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59162","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59143","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59108","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59159","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59172","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.5919","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59173","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59154","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59195","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59174","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59157","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59177","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59047","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.5912","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14498"},{"reference_url":"https://docs.silverstripe.org/en/3/changelogs/3.6.1","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://docs.silverstripe.org/en/3/changelogs/3.6.1"},{"reference_url":"https://github.com/silverstripe/silverstripe-framework/commit/25b77a2ff8deabe8e8894002b9a5647eaec27b0a","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/silverstripe/silverstripe-framework/commit/25b77a2ff8deabe8e8894002b9a5647eaec27b0a"},{"reference_url":"https://github.com/silverstripe/silverstripe-installer/commit/c25478bef75cc5482852e80a1fa6f1f0e6460e39","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/silverstripe/silverstripe-installer/commit/c25478bef75cc5482852e80a1fa6f1f0e6460e39"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:silverstripe:silverstripe:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:silverstripe:silverstripe:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:silverstripe:silverstripe:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-14498","reference_id":"CVE-2017-14498","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"},{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-14498"},{"reference_url":"https://github.com/advisories/GHSA-j696-6m57-mcrv","reference_id":"GHSA-j696-6m57-mcrv","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-j696-6m57-mcrv"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/83262?format=json","purl":"pkg:composer/silverstripe/cms@3.6.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2f9j-ek3x-kbc5"},{"vulnerability":"VCID-658d-vmwt-f7e8"},{"vulnerability":"VCID-g366-c4n9-vfcs"},{"vulnerability":"VCID-gme6-wj87-ekfw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:composer/silverstripe/cms@3.6.1"}],"aliases":["CVE-2017-14498","GHSA-j696-6m57-mcrv"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c3vp-kc9a-vkhn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57562?format=json","vulnerability_id":"VCID-g366-c4n9-vfcs","summary":"Silverstripe CMS malicious file upload enables script execution\nSilverstripe CMS through 4.5 can be susceptible to script execution from malicious upload contents under allowed file extensions (for example HTML code in a TXT file). When these files are stored as protected or draft files, the MIME detection can cause browsers to execute the file contents. Uploads stored as protected or draft files are allowed by default for authorised users only, but can also be enabled through custom logic as well as modules such as silverstripe/userforms. Sites using the previously optional silverstripe/mimevalidator module can configure MIME whitelists rather than extension whitelists, and hence prevent this issue. Sites on the Common Web Platform (CWP) use this module by default, and are not affected.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-9309","reference_id":"","reference_type":"","scores":[{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72698","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72618","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72608","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.7265","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.7266","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72651","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72693","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72702","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72562","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72569","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72586","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.726","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72612","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72635","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-9309"},{"reference_url":"https://github.com/silverstripe/silverstripe-cms","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/silverstripe/silverstripe-cms"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-9309","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-9309"},{"reference_url":"https://www.silverstripe.org/download/security-releases/CVE-2020-9309","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.silverstripe.org/download/security-releases/CVE-2020-9309"},{"reference_url":"https://github.com/advisories/GHSA-h77w-655f-6j3m","reference_id":"GHSA-h77w-655f-6j3m","reference_type":"","scores":[{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-h77w-655f-6j3m"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/307444?format=json","purl":"pkg:composer/silverstripe/cms@4.5.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4x32-t75c-u3bj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:composer/silverstripe/cms@4.5.1"}],"aliases":["CVE-2020-9309","GHSA-h77w-655f-6j3m"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g366-c4n9-vfcs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/55122?format=json","vulnerability_id":"VCID-gme6-wj87-ekfw","summary":"Silverstripe CMS information disclosure\nIn SilverStripe through 4.5.0, a specific URL path configured by default through the silverstripe/framework module can be used to disclose the fact that a domain is hosting a Silverstripe application. There is no disclosure of the specific version. The functionality on this URL path is limited to execution in a CLI context, and is not known to present a vulnerability through web-based access. As a side-effect, this preconfigured path also blocks the creation of other resources on this path (e.g. a page).","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6164","reference_id":"","reference_type":"","scores":[{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.7205","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72147","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72152","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72144","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.721","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72115","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72107","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72066","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72082","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72099","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72076","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72063","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72024","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.7203","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72027","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6164"},{"reference_url":"https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/framework/CVE-2020-6164.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/framework/CVE-2020-6164.yaml"},{"reference_url":"https://github.com/silverstripe/silverstripe-cms","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/silverstripe/silverstripe-cms"},{"reference_url":"https://github.com/silverstripe/silverstripe-framework/commit/91d30db88f68b9b87980ef9a59e208a81980b72c","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/silverstripe/silverstripe-framework/commit/91d30db88f68b9b87980ef9a59e208a81980b72c"},{"reference_url":"https://github.com/silverstripe/silverstripe-framework/commit/cce2b1630937895aa28c2914837651e7cd56d74b","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/silverstripe/silverstripe-framework/commit/cce2b1630937895aa28c2914837651e7cd56d74b"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-6164","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-6164"},{"reference_url":"https://www.silverstripe.org/download/security-releases/CVE-2020-6164","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.silverstripe.org/download/security-releases/CVE-2020-6164"},{"reference_url":"https://github.com/advisories/GHSA-gm5x-hpmw-xpxg","reference_id":"GHSA-gm5x-hpmw-xpxg","reference_type":"","scores":[{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-gm5x-hpmw-xpxg"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/307444?format=json","purl":"pkg:composer/silverstripe/cms@4.5.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4x32-t75c-u3bj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:composer/silverstripe/cms@4.5.1"}],"aliases":["CVE-2020-6164","GHSA-gm5x-hpmw-xpxg"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gme6-wj87-ekfw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/7835?format=json","vulnerability_id":"VCID-j6ze-f76y-cqgy","summary":"Cross-site Scripting\nThere is an XSS in SilverStripe CMS.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5197","reference_id":"","reference_type":"","scores":[{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49906","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49953","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49972","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49943","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49941","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49986","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49987","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49946","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49891","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49928","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49955","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49905","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.4996","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5197"},{"reference_url":"https://web.archive.org/web/20210123234141/http://www.securityfocus.com/bid/96572","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20210123234141/http://www.securityfocus.com/bid/96572"},{"reference_url":"https://www.silverstripe.org/download/security-releases","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.silverstripe.org/download/security-releases"},{"reference_url":"https://www.silverstripe.org/download/security-releases/","reference_id":"","reference_type":"","scores":[],"url":"https://www.silverstripe.org/download/security-releases/"},{"reference_url":"http://www.securityfocus.com/bid/96572","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/96572"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5197","reference_id":"CVE-2017-5197","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5197"},{"reference_url":"https://github.com/advisories/GHSA-xmjh-wjc5-wg4h","reference_id":"GHSA-xmjh-wjc5-wg4h","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-xmjh-wjc5-wg4h"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/55130?format=json","purl":"pkg:composer/silverstripe/cms@3.4.4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2f9j-ek3x-kbc5"},{"vulnerability":"VCID-658d-vmwt-f7e8"},{"vulnerability":"VCID-c3vp-kc9a-vkhn"},{"vulnerability":"VCID-g366-c4n9-vfcs"},{"vulnerability":"VCID-gme6-wj87-ekfw"},{"vulnerability":"VCID-kdyk-rrrr-pufw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:composer/silverstripe/cms@3.4.4"},{"url":"http://public2.vulnerablecode.io/api/packages/55131?format=json","purl":"pkg:composer/silverstripe/cms@3.5.2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2f9j-ek3x-kbc5"},{"vulnerability":"VCID-658d-vmwt-f7e8"},{"vulnerability":"VCID-c3vp-kc9a-vkhn"},{"vulnerability":"VCID-g366-c4n9-vfcs"},{"vulnerability":"VCID-gme6-wj87-ekfw"},{"vulnerability":"VCID-kdyk-rrrr-pufw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:composer/silverstripe/cms@3.5.2"}],"aliases":["CVE-2017-5197","GHSA-xmjh-wjc5-wg4h"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j6ze-f76y-cqgy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/15219?format=json","vulnerability_id":"VCID-jdyv-jdju-kbb2","summary":"Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\nMultiple cross-site scripting (XSS) vulnerabilities in SilverStripe CMS & Framework before 3.1.16 and 3.2.x before 3.2.1 allow remote attackers to inject arbitrary web script or HTML via the (1) Locale or (2) FailedLoginCount parameter to admin/security/EditForm/field/Members/item/new/ItemEditForm.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8606","reference_id":"","reference_type":"","scores":[{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61149","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61141","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.6112","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61072","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61105","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61077","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61152","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61171","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61165","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61124","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61143","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61156","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61136","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8606"},{"reference_url":"http://seclists.org/fulldisclosure/2015/Dec/55","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://seclists.org/fulldisclosure/2015/Dec/55"},{"reference_url":"https://github.com/silverstripe/silverstripe-cms","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/silverstripe/silverstripe-cms"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/12/17/1","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openwall.com/lists/oss-security/2015/12/17/1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/12/17/11","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openwall.com/lists/oss-security/2015/12/17/11"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/12/18/5","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openwall.com/lists/oss-security/2015/12/18/5"},{"reference_url":"http://www.silverstripe.org/download/security-releases/ss-2015-026","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.silverstripe.org/download/security-releases/ss-2015-026"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:silverstripe:silverstripe:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:silverstripe:silverstripe:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:silverstripe:silverstripe:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:silverstripe:silverstripe:3.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:silverstripe:silverstripe:3.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:silverstripe:silverstripe:3.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8606","reference_id":"CVE-2015-8606","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"},{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8606"},{"reference_url":"https://cybersecurityworks.com/zerodays/cve-2015-8606-silverstripe.html","reference_id":"CVE-2015-8606-SILVERSTRIPE.HTML","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://cybersecurityworks.com/zerodays/cve-2015-8606-silverstripe.html"},{"reference_url":"https://github.com/advisories/GHSA-gvc8-xjfp-6569","reference_id":"GHSA-gvc8-xjfp-6569","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-gvc8-xjfp-6569"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/153324?format=json","purl":"pkg:composer/silverstripe/cms@3.1.16-rc1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2f9j-ek3x-kbc5"},{"vulnerability":"VCID-658d-vmwt-f7e8"},{"vulnerability":"VCID-agbu-v7vd-fyc8"},{"vulnerability":"VCID-c3vp-kc9a-vkhn"},{"vulnerability":"VCID-g366-c4n9-vfcs"},{"vulnerability":"VCID-gme6-wj87-ekfw"},{"vulnerability":"VCID-j6ze-f76y-cqgy"},{"vulnerability":"VCID-kdyk-rrrr-pufw"},{"vulnerability":"VCID-mr46-bvjx-n7ar"},{"vulnerability":"VCID-qjey-bhrt-kud4"},{"vulnerability":"VCID-wpu5-3h5v-wuhj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:composer/silverstripe/cms@3.1.16-rc1"},{"url":"http://public2.vulnerablecode.io/api/packages/53860?format=json","purl":"pkg:composer/silverstripe/cms@3.1.16","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2f9j-ek3x-kbc5"},{"vulnerability":"VCID-658d-vmwt-f7e8"},{"vulnerability":"VCID-agbu-v7vd-fyc8"},{"vulnerability":"VCID-c3vp-kc9a-vkhn"},{"vulnerability":"VCID-g366-c4n9-vfcs"},{"vulnerability":"VCID-gme6-wj87-ekfw"},{"vulnerability":"VCID-j6ze-f76y-cqgy"},{"vulnerability":"VCID-kdyk-rrrr-pufw"},{"vulnerability":"VCID-mr46-bvjx-n7ar"},{"vulnerability":"VCID-qjey-bhrt-kud4"},{"vulnerability":"VCID-wpu5-3h5v-wuhj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:composer/silverstripe/cms@3.1.16"},{"url":"http://public2.vulnerablecode.io/api/packages/153330?format=json","purl":"pkg:composer/silverstripe/cms@3.2.1-rc1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2f9j-ek3x-kbc5"},{"vulnerability":"VCID-658d-vmwt-f7e8"},{"vulnerability":"VCID-agbu-v7vd-fyc8"},{"vulnerability":"VCID-c3vp-kc9a-vkhn"},{"vulnerability":"VCID-g366-c4n9-vfcs"},{"vulnerability":"VCID-gme6-wj87-ekfw"},{"vulnerability":"VCID-j6ze-f76y-cqgy"},{"vulnerability":"VCID-kdyk-rrrr-pufw"},{"vulnerability":"VCID-mr46-bvjx-n7ar"},{"vulnerability":"VCID-qjey-bhrt-kud4"},{"vulnerability":"VCID-wpu5-3h5v-wuhj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:composer/silverstripe/cms@3.2.1-rc1"},{"url":"http://public2.vulnerablecode.io/api/packages/53862?format=json","purl":"pkg:composer/silverstripe/cms@3.2.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2f9j-ek3x-kbc5"},{"vulnerability":"VCID-658d-vmwt-f7e8"},{"vulnerability":"VCID-agbu-v7vd-fyc8"},{"vulnerability":"VCID-c3vp-kc9a-vkhn"},{"vulnerability":"VCID-g366-c4n9-vfcs"},{"vulnerability":"VCID-gme6-wj87-ekfw"},{"vulnerability":"VCID-j6ze-f76y-cqgy"},{"vulnerability":"VCID-kdyk-rrrr-pufw"},{"vulnerability":"VCID-mr46-bvjx-n7ar"},{"vulnerability":"VCID-qjey-bhrt-kud4"},{"vulnerability":"VCID-wpu5-3h5v-wuhj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:composer/silverstripe/cms@3.2.1"}],"aliases":["CVE-2015-8606","GHSA-gvc8-xjfp-6569"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jdyv-jdju-kbb2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/8357?format=json","vulnerability_id":"VCID-kdyk-rrrr-pufw","summary":"Information Exposure\nResponse discrepancy in the login and password reset forms in SilverStripe CMS allows remote attackers to enumerate users via timing attack.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12849","reference_id":"","reference_type":"","scores":[{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45747","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45896","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45866","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45873","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45926","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45921","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45796","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45806","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45785","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.4585","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45872","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45822","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45878","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45874","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12849"},{"reference_url":"https://www.silverstripe.org/download/security-releases/ss-2017-005","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.silverstripe.org/download/security-releases/ss-2017-005"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:silverstripe:silverstripe:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:silverstripe:silverstripe:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:silverstripe:silverstripe:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:silverstripe:silverstripe:3.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:silverstripe:silverstripe:3.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:silverstripe:silverstripe:3.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-12849","reference_id":"CVE-2017-12849","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-12849"},{"reference_url":"https://github.com/advisories/GHSA-fwhr-g5r4-xgxf","reference_id":"GHSA-fwhr-g5r4-xgxf","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-fwhr-g5r4-xgxf"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84633?format=json","purl":"pkg:composer/silverstripe/cms@3.5.5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2f9j-ek3x-kbc5"},{"vulnerability":"VCID-658d-vmwt-f7e8"},{"vulnerability":"VCID-c3vp-kc9a-vkhn"},{"vulnerability":"VCID-g366-c4n9-vfcs"},{"vulnerability":"VCID-gme6-wj87-ekfw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:composer/silverstripe/cms@3.5.5"},{"url":"http://public2.vulnerablecode.io/api/packages/83262?format=json","purl":"pkg:composer/silverstripe/cms@3.6.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2f9j-ek3x-kbc5"},{"vulnerability":"VCID-658d-vmwt-f7e8"},{"vulnerability":"VCID-g366-c4n9-vfcs"},{"vulnerability":"VCID-gme6-wj87-ekfw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:composer/silverstripe/cms@3.6.1"}],"aliases":["CVE-2017-12849","GHSA-fwhr-g5r4-xgxf"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kdyk-rrrr-pufw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/15522?format=json","vulnerability_id":"VCID-kz63-ftzc-tudk","summary":"Silverstripe CMS Open Redirect\nOpen redirect vulnerability in SilverStripe CMS & Framework 3.1.13 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the returnURL parameter to dev/build.","references":[{"reference_url":"http://hyp3rlinx.altervista.org/advisories/AS-SILVERSTRIPE0607.txt","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://hyp3rlinx.altervista.org/advisories/AS-SILVERSTRIPE0607.txt"},{"reference_url":"http://packetstormsecurity.com/files/132223/SilverStripe-CMS-3.1.13-XSS-Open-Redirect.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://packetstormsecurity.com/files/132223/SilverStripe-CMS-3.1.13-XSS-Open-Redirect.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5062","reference_id":"","reference_type":"","scores":[{"value":"0.00347","scoring_system":"epss","scoring_elements":"0.57288","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00347","scoring_system":"epss","scoring_elements":"0.5735","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00347","scoring_system":"epss","scoring_elements":"0.57328","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00347","scoring_system":"epss","scoring_elements":"0.57285","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00347","scoring_system":"epss","scoring_elements":"0.57307","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00347","scoring_system":"epss","scoring_elements":"0.5722","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00347","scoring_system":"epss","scoring_elements":"0.57302","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00347","scoring_system":"epss","scoring_elements":"0.57325","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00347","scoring_system":"epss","scoring_elements":"0.573","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00347","scoring_system":"epss","scoring_elements":"0.57352","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00347","scoring_system":"epss","scoring_elements":"0.57354","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00347","scoring_system":"epss","scoring_elements":"0.57369","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00347","scoring_system":"epss","scoring_elements":"0.57349","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00347","scoring_system":"epss","scoring_elements":"0.57327","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5062"},{"reference_url":"https://web.archive.org/web/20200228091958/http://www.securityfocus.com/bid/75419","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20200228091958/http://www.securityfocus.com/bid/75419"},{"reference_url":"https://web.archive.org/web/20201209000421/http://www.securityfocus.com/archive/1/535716/100/0/threaded","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20201209000421/http://www.securityfocus.com/archive/1/535716/100/0/threaded"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-5062","reference_id":"CVE-2015-5062","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-5062"},{"reference_url":"https://github.com/advisories/GHSA-fh35-p8ph-p545","reference_id":"GHSA-fh35-p8ph-p545","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-fh35-p8ph-p545"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/153322?format=json","purl":"pkg:composer/silverstripe/cms@3.1.14-rc1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2f9j-ek3x-kbc5"},{"vulnerability":"VCID-658d-vmwt-f7e8"},{"vulnerability":"VCID-agbu-v7vd-fyc8"},{"vulnerability":"VCID-c3vp-kc9a-vkhn"},{"vulnerability":"VCID-g366-c4n9-vfcs"},{"vulnerability":"VCID-gme6-wj87-ekfw"},{"vulnerability":"VCID-j6ze-f76y-cqgy"},{"vulnerability":"VCID-jdyv-jdju-kbb2"},{"vulnerability":"VCID-kdyk-rrrr-pufw"},{"vulnerability":"VCID-mr46-bvjx-n7ar"},{"vulnerability":"VCID-qjey-bhrt-kud4"},{"vulnerability":"VCID-wpu5-3h5v-wuhj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:composer/silverstripe/cms@3.1.14-rc1"}],"aliases":["CVE-2015-5062","GHSA-fh35-p8ph-p545"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kz63-ftzc-tudk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/7320?format=json","vulnerability_id":"VCID-mr46-bvjx-n7ar","summary":"Missing security check on dev/build/defaults\nThe `buildDefaults` method on `DevelopmentAdmin` is missing a permission check. In live mode, if you access /dev/build, you are requested to login first. However, if you access /dev/build/defaults, then the action is performed without any login check. This should be protected in the same way that /dev/build is. The `buildDefaults` view is `requireDefaultRecords()` on each `DataObject` class, and hence has the potential to modify database state. It also lists all modified tables, allowing attackers more insight into which modules are used, and how the database tables are structured.","references":[{"reference_url":"http://www.silverstripe.org/download/security-releases/ss-2015-028/","reference_id":"","reference_type":"","scores":[],"url":"http://www.silverstripe.org/download/security-releases/ss-2015-028/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/21821?format=json","purl":"pkg:composer/silverstripe/cms@3.1.17","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2f9j-ek3x-kbc5"},{"vulnerability":"VCID-658d-vmwt-f7e8"},{"vulnerability":"VCID-c3vp-kc9a-vkhn"},{"vulnerability":"VCID-g366-c4n9-vfcs"},{"vulnerability":"VCID-gme6-wj87-ekfw"},{"vulnerability":"VCID-j6ze-f76y-cqgy"},{"vulnerability":"VCID-kdyk-rrrr-pufw"},{"vulnerability":"VCID-wpu5-3h5v-wuhj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:composer/silverstripe/cms@3.1.17"},{"url":"http://public2.vulnerablecode.io/api/packages/21822?format=json","purl":"pkg:composer/silverstripe/cms@3.2.2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2f9j-ek3x-kbc5"},{"vulnerability":"VCID-658d-vmwt-f7e8"},{"vulnerability":"VCID-c3vp-kc9a-vkhn"},{"vulnerability":"VCID-g366-c4n9-vfcs"},{"vulnerability":"VCID-gme6-wj87-ekfw"},{"vulnerability":"VCID-j6ze-f76y-cqgy"},{"vulnerability":"VCID-kdyk-rrrr-pufw"},{"vulnerability":"VCID-wpu5-3h5v-wuhj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:composer/silverstripe/cms@3.2.2"},{"url":"http://public2.vulnerablecode.io/api/packages/21823?format=json","purl":"pkg:composer/silverstripe/cms@3.3.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2f9j-ek3x-kbc5"},{"vulnerability":"VCID-658d-vmwt-f7e8"},{"vulnerability":"VCID-c3vp-kc9a-vkhn"},{"vulnerability":"VCID-g366-c4n9-vfcs"},{"vulnerability":"VCID-gme6-wj87-ekfw"},{"vulnerability":"VCID-j6ze-f76y-cqgy"},{"vulnerability":"VCID-kdyk-rrrr-pufw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:composer/silverstripe/cms@3.3.0"}],"aliases":["SS-2015-028"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mr46-bvjx-n7ar"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/7084?format=json","vulnerability_id":"VCID-qdtk-twxp-2kbv","summary":"Incorrect Permission Assignment for Critical Resource\nSiteTree Creation Permission Vulnerability in silverstripe.","references":[{"reference_url":"https://www.silverstripe.org/software/download/security-releases/ss-2015-008-sitetree-creation-permission-vulnerability/","reference_id":"","reference_type":"","scores":[],"url":"https://www.silverstripe.org/software/download/security-releases/ss-2015-008-sitetree-creation-permission-vulnerability/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/21050?format=json","purl":"pkg:composer/silverstripe/cms@3.1.11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2f9j-ek3x-kbc5"},{"vulnerability":"VCID-658d-vmwt-f7e8"},{"vulnerability":"VCID-agbu-v7vd-fyc8"},{"vulnerability":"VCID-c3vp-kc9a-vkhn"},{"vulnerability":"VCID-g366-c4n9-vfcs"},{"vulnerability":"VCID-gme6-wj87-ekfw"},{"vulnerability":"VCID-j6ze-f76y-cqgy"},{"vulnerability":"VCID-jdyv-jdju-kbb2"},{"vulnerability":"VCID-kdyk-rrrr-pufw"},{"vulnerability":"VCID-kz63-ftzc-tudk"},{"vulnerability":"VCID-mr46-bvjx-n7ar"},{"vulnerability":"VCID-qjey-bhrt-kud4"},{"vulnerability":"VCID-wpu5-3h5v-wuhj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:composer/silverstripe/cms@3.1.11"},{"url":"http://public2.vulnerablecode.io/api/packages/152024?format=json","purl":"pkg:composer/silverstripe/cms@3.1.13-rc1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2f9j-ek3x-kbc5"},{"vulnerability":"VCID-658d-vmwt-f7e8"},{"vulnerability":"VCID-agbu-v7vd-fyc8"},{"vulnerability":"VCID-c3vp-kc9a-vkhn"},{"vulnerability":"VCID-g366-c4n9-vfcs"},{"vulnerability":"VCID-gme6-wj87-ekfw"},{"vulnerability":"VCID-j6ze-f76y-cqgy"},{"vulnerability":"VCID-jdyv-jdju-kbb2"},{"vulnerability":"VCID-kdyk-rrrr-pufw"},{"vulnerability":"VCID-kz63-ftzc-tudk"},{"vulnerability":"VCID-mr46-bvjx-n7ar"},{"vulnerability":"VCID-qjey-bhrt-kud4"},{"vulnerability":"VCID-wpu5-3h5v-wuhj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:composer/silverstripe/cms@3.1.13-rc1"}],"aliases":["SS-2015-008-1"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qdtk-twxp-2kbv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/7319?format=json","vulnerability_id":"VCID-qjey-bhrt-kud4","summary":"CSRF vulnerability in GridFieldAddExistingAutocompleter\nGridField does not have sufficient CSRF protection, meaning that in some cases users with CMS access can be tricked into posting unspecified data into the CMS from external websites. Amongst other default CMS interfaces, GridField is used for management of groups, users and permissions in the CMS.","references":[{"reference_url":"http://www.silverstripe.org/download/security-releases/ss-2016-002/","reference_id":"","reference_type":"","scores":[],"url":"http://www.silverstripe.org/download/security-releases/ss-2016-002/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/21821?format=json","purl":"pkg:composer/silverstripe/cms@3.1.17","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2f9j-ek3x-kbc5"},{"vulnerability":"VCID-658d-vmwt-f7e8"},{"vulnerability":"VCID-c3vp-kc9a-vkhn"},{"vulnerability":"VCID-g366-c4n9-vfcs"},{"vulnerability":"VCID-gme6-wj87-ekfw"},{"vulnerability":"VCID-j6ze-f76y-cqgy"},{"vulnerability":"VCID-kdyk-rrrr-pufw"},{"vulnerability":"VCID-wpu5-3h5v-wuhj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:composer/silverstripe/cms@3.1.17"},{"url":"http://public2.vulnerablecode.io/api/packages/21822?format=json","purl":"pkg:composer/silverstripe/cms@3.2.2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2f9j-ek3x-kbc5"},{"vulnerability":"VCID-658d-vmwt-f7e8"},{"vulnerability":"VCID-c3vp-kc9a-vkhn"},{"vulnerability":"VCID-g366-c4n9-vfcs"},{"vulnerability":"VCID-gme6-wj87-ekfw"},{"vulnerability":"VCID-j6ze-f76y-cqgy"},{"vulnerability":"VCID-kdyk-rrrr-pufw"},{"vulnerability":"VCID-wpu5-3h5v-wuhj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:composer/silverstripe/cms@3.2.2"},{"url":"http://public2.vulnerablecode.io/api/packages/21823?format=json","purl":"pkg:composer/silverstripe/cms@3.3.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2f9j-ek3x-kbc5"},{"vulnerability":"VCID-658d-vmwt-f7e8"},{"vulnerability":"VCID-c3vp-kc9a-vkhn"},{"vulnerability":"VCID-g366-c4n9-vfcs"},{"vulnerability":"VCID-gme6-wj87-ekfw"},{"vulnerability":"VCID-j6ze-f76y-cqgy"},{"vulnerability":"VCID-kdyk-rrrr-pufw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:composer/silverstripe/cms@3.3.0"}],"aliases":["SS-2016-002"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qjey-bhrt-kud4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/19773?format=json","vulnerability_id":"VCID-rbft-1w3r-3ub7","summary":"Silverstripe SiteTree Creation Permission Vulnerability\nA vulnerability exists in the permission validation for SiteTree object creation. By default user permissions are not validated by the SiteTree::canCreate method, unless overridden by user code or via the configuration system.\n\nThis vulnerability will allow users, or unauthenticated guests, to create new SiteTree objects in the database. This vulnerability is present when such users are given CMS access via other means, or if there is another mechanism (such as RestfulServer module) which allows model editing and relies on model-level permission checks.\n\nThis vulnerability is restricted to the creation of draft or live pages, and does not allow users to edit, publish, or unpublish existing pages.\n\nAll users should upgrade as soon as possible.","references":[{"reference_url":"https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/cms/SS-2015-008-1.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/cms/SS-2015-008-1.yaml"},{"reference_url":"https://github.com/silverstripe/silverstripe-cms","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/silverstripe/silverstripe-cms"},{"reference_url":"https://github.com/silverstripe/silverstripe-cms/commit/3df41e1176385215f15fffb04fcba033a5151fb4","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/silverstripe/silverstripe-cms/commit/3df41e1176385215f15fffb04fcba033a5151fb4"},{"reference_url":"https://github.com/silverstripe/silverstripe-cms/commit/64955e57d1239975183f47d3ac8c3e801ddbf122","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/silverstripe/silverstripe-cms/commit/64955e57d1239975183f47d3ac8c3e801ddbf122"},{"reference_url":"https://www.silverstripe.org/software/download/security-releases/ss-2015-008-sitetree-creation-permission-vulnerability","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.silverstripe.org/software/download/security-releases/ss-2015-008-sitetree-creation-permission-vulnerability"},{"reference_url":"https://github.com/advisories/GHSA-3mm9-2p44-rw39","reference_id":"GHSA-3mm9-2p44-rw39","reference_type":"","scores":[{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-3mm9-2p44-rw39"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/21050?format=json","purl":"pkg:composer/silverstripe/cms@3.1.11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2f9j-ek3x-kbc5"},{"vulnerability":"VCID-658d-vmwt-f7e8"},{"vulnerability":"VCID-agbu-v7vd-fyc8"},{"vulnerability":"VCID-c3vp-kc9a-vkhn"},{"vulnerability":"VCID-g366-c4n9-vfcs"},{"vulnerability":"VCID-gme6-wj87-ekfw"},{"vulnerability":"VCID-j6ze-f76y-cqgy"},{"vulnerability":"VCID-jdyv-jdju-kbb2"},{"vulnerability":"VCID-kdyk-rrrr-pufw"},{"vulnerability":"VCID-kz63-ftzc-tudk"},{"vulnerability":"VCID-mr46-bvjx-n7ar"},{"vulnerability":"VCID-qjey-bhrt-kud4"},{"vulnerability":"VCID-wpu5-3h5v-wuhj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:composer/silverstripe/cms@3.1.11"}],"aliases":["GHSA-3mm9-2p44-rw39"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rbft-1w3r-3ub7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/7215?format=json","vulnerability_id":"VCID-wpu5-3h5v-wuhj","summary":"Advanced workflow member field exposure\nBy default, the CMS Admin editable template for the NotifyUsers action has access to a large number of fields, including (for instance) `Member#Password`. This would allow a malicious CMS Admin to extract other admin passwords by adding a template emailing these fields to themselves when other admins trigger the workflow. A new configuration option has been added; when this option is set to `true` via the Config API then only member fields specified via `Member.summary_fields` may be accessed.","references":[{"reference_url":"http://www.silverstripe.org/download/security-releases/SS-2015-023","reference_id":"","reference_type":"","scores":[],"url":"http://www.silverstripe.org/download/security-releases/SS-2015-023"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/21317?format=json","purl":"pkg:composer/silverstripe/cms@3.2.3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2f9j-ek3x-kbc5"},{"vulnerability":"VCID-658d-vmwt-f7e8"},{"vulnerability":"VCID-c3vp-kc9a-vkhn"},{"vulnerability":"VCID-g366-c4n9-vfcs"},{"vulnerability":"VCID-gme6-wj87-ekfw"},{"vulnerability":"VCID-j6ze-f76y-cqgy"},{"vulnerability":"VCID-kdyk-rrrr-pufw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:composer/silverstripe/cms@3.2.3"},{"url":"http://public2.vulnerablecode.io/api/packages/153333?format=json","purl":"pkg:composer/silverstripe/cms@3.3.0-rc2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2f9j-ek3x-kbc5"},{"vulnerability":"VCID-658d-vmwt-f7e8"},{"vulnerability":"VCID-agbu-v7vd-fyc8"},{"vulnerability":"VCID-c3vp-kc9a-vkhn"},{"vulnerability":"VCID-g366-c4n9-vfcs"},{"vulnerability":"VCID-gme6-wj87-ekfw"},{"vulnerability":"VCID-j6ze-f76y-cqgy"},{"vulnerability":"VCID-kdyk-rrrr-pufw"},{"vulnerability":"VCID-mr46-bvjx-n7ar"},{"vulnerability":"VCID-qjey-bhrt-kud4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:composer/silverstripe/cms@3.3.0-rc2"}],"aliases":["SS-2015-023"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wpu5-3h5v-wuhj"}],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/19747?format=json","vulnerability_id":"VCID-77at-thqm-c3bg","summary":"Silverstripe XSS vulnerability via VirtualPage\nA cross-site scripting vulnerability has been discovered in the VirtualPage class.\n\nThis vulnerability can only be exploited if a user with CMS access has posted malicious or unescaped HTML into any of the textfields of a page which a VirtualPage refers to.\n\nThis has been resolved by ensuring that VirtualPage safely escapes all field content.","references":[{"reference_url":"https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/cms/SS-2015-005-1.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/cms/SS-2015-005-1.yaml"},{"reference_url":"https://github.com/silverstripe/silverstripe-cms","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/silverstripe/silverstripe-cms"},{"reference_url":"https://www.silverstripe.org/software/download/security-releases/ss-2015-005","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.silverstripe.org/software/download/security-releases/ss-2015-005"},{"reference_url":"https://github.com/advisories/GHSA-r97r-64vp-fghm","reference_id":"GHSA-r97r-64vp-fghm","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-r97r-64vp-fghm"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/20988?format=json","purl":"pkg:composer/silverstripe/cms@3.1.10","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2f9j-ek3x-kbc5"},{"vulnerability":"VCID-658d-vmwt-f7e8"},{"vulnerability":"VCID-agbu-v7vd-fyc8"},{"vulnerability":"VCID-c3vp-kc9a-vkhn"},{"vulnerability":"VCID-g366-c4n9-vfcs"},{"vulnerability":"VCID-gme6-wj87-ekfw"},{"vulnerability":"VCID-j6ze-f76y-cqgy"},{"vulnerability":"VCID-jdyv-jdju-kbb2"},{"vulnerability":"VCID-kdyk-rrrr-pufw"},{"vulnerability":"VCID-kz63-ftzc-tudk"},{"vulnerability":"VCID-mr46-bvjx-n7ar"},{"vulnerability":"VCID-qdtk-twxp-2kbv"},{"vulnerability":"VCID-qjey-bhrt-kud4"},{"vulnerability":"VCID-rbft-1w3r-3ub7"},{"vulnerability":"VCID-wpu5-3h5v-wuhj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:composer/silverstripe/cms@3.1.10"}],"aliases":["GHSA-r97r-64vp-fghm"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-77at-thqm-c3bg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/7065?format=json","vulnerability_id":"VCID-s244-c4bb-qqd3","summary":"Cross-site Scripting\nVirtualPage XSS in silverstripe.","references":[{"reference_url":"https://www.silverstripe.org/software/download/security-releases/ss-2015-005/","reference_id":"","reference_type":"","scores":[],"url":"https://www.silverstripe.org/software/download/security-releases/ss-2015-005/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/151747?format=json","purl":"pkg:composer/silverstripe/cms@3.1.10-rc1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2f9j-ek3x-kbc5"},{"vulnerability":"VCID-658d-vmwt-f7e8"},{"vulnerability":"VCID-77at-thqm-c3bg"},{"vulnerability":"VCID-agbu-v7vd-fyc8"},{"vulnerability":"VCID-c3vp-kc9a-vkhn"},{"vulnerability":"VCID-g366-c4n9-vfcs"},{"vulnerability":"VCID-gme6-wj87-ekfw"},{"vulnerability":"VCID-j6ze-f76y-cqgy"},{"vulnerability":"VCID-jdyv-jdju-kbb2"},{"vulnerability":"VCID-kdyk-rrrr-pufw"},{"vulnerability":"VCID-kz63-ftzc-tudk"},{"vulnerability":"VCID-mr46-bvjx-n7ar"},{"vulnerability":"VCID-qdtk-twxp-2kbv"},{"vulnerability":"VCID-qjey-bhrt-kud4"},{"vulnerability":"VCID-rbft-1w3r-3ub7"},{"vulnerability":"VCID-t1eq-bsbe-77ht"},{"vulnerability":"VCID-wpu5-3h5v-wuhj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:composer/silverstripe/cms@3.1.10-rc1"},{"url":"http://public2.vulnerablecode.io/api/packages/20988?format=json","purl":"pkg:composer/silverstripe/cms@3.1.10","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2f9j-ek3x-kbc5"},{"vulnerability":"VCID-658d-vmwt-f7e8"},{"vulnerability":"VCID-agbu-v7vd-fyc8"},{"vulnerability":"VCID-c3vp-kc9a-vkhn"},{"vulnerability":"VCID-g366-c4n9-vfcs"},{"vulnerability":"VCID-gme6-wj87-ekfw"},{"vulnerability":"VCID-j6ze-f76y-cqgy"},{"vulnerability":"VCID-jdyv-jdju-kbb2"},{"vulnerability":"VCID-kdyk-rrrr-pufw"},{"vulnerability":"VCID-kz63-ftzc-tudk"},{"vulnerability":"VCID-mr46-bvjx-n7ar"},{"vulnerability":"VCID-qdtk-twxp-2kbv"},{"vulnerability":"VCID-qjey-bhrt-kud4"},{"vulnerability":"VCID-rbft-1w3r-3ub7"},{"vulnerability":"VCID-wpu5-3h5v-wuhj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:composer/silverstripe/cms@3.1.10"}],"aliases":["SS-2015-005-1"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s244-c4bb-qqd3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/19402?format=json","vulnerability_id":"VCID-t1eq-bsbe-77ht","summary":"Silverstripe History XSS Vulnerability\nA cross-site scripting vulnerability has been discovered in the CMS page history tab.\n\nThis vulnerability can only be exploited if a user with CMS access has posted malicious or unescaped HTML into any of the text fields on a page, and if the \"compare mode\" option is selected. The HTML will be embedded into the page unescaped.\n\nThis has been resolved by performing the text comparison in a HTML friendly way.","references":[{"reference_url":"https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/cms/SS-2015-003-1.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/cms/SS-2015-003-1.yaml"},{"reference_url":"https://github.com/silverstripe/silverstripe-cms","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/silverstripe/silverstripe-cms"},{"reference_url":"https://www.silverstripe.org/software/download/security-releases/ss-2015-003","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.silverstripe.org/software/download/security-releases/ss-2015-003"},{"reference_url":"https://github.com/advisories/GHSA-6hh6-59j2-qrxw","reference_id":"GHSA-6hh6-59j2-qrxw","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-6hh6-59j2-qrxw"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/20988?format=json","purl":"pkg:composer/silverstripe/cms@3.1.10","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2f9j-ek3x-kbc5"},{"vulnerability":"VCID-658d-vmwt-f7e8"},{"vulnerability":"VCID-agbu-v7vd-fyc8"},{"vulnerability":"VCID-c3vp-kc9a-vkhn"},{"vulnerability":"VCID-g366-c4n9-vfcs"},{"vulnerability":"VCID-gme6-wj87-ekfw"},{"vulnerability":"VCID-j6ze-f76y-cqgy"},{"vulnerability":"VCID-jdyv-jdju-kbb2"},{"vulnerability":"VCID-kdyk-rrrr-pufw"},{"vulnerability":"VCID-kz63-ftzc-tudk"},{"vulnerability":"VCID-mr46-bvjx-n7ar"},{"vulnerability":"VCID-qdtk-twxp-2kbv"},{"vulnerability":"VCID-qjey-bhrt-kud4"},{"vulnerability":"VCID-rbft-1w3r-3ub7"},{"vulnerability":"VCID-wpu5-3h5v-wuhj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:composer/silverstripe/cms@3.1.10"}],"aliases":["GHSA-6hh6-59j2-qrxw"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t1eq-bsbe-77ht"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/7067?format=json","vulnerability_id":"VCID-zqu9-qfx1-sbcu","summary":"Cross-site Scripting\nHistory XSS Vulnerability in silverstripe.","references":[{"reference_url":"https://www.silverstripe.org/software/download/security-releases/ss-2015-003/","reference_id":"","reference_type":"","scores":[],"url":"https://www.silverstripe.org/software/download/security-releases/ss-2015-003/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/151747?format=json","purl":"pkg:composer/silverstripe/cms@3.1.10-rc1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2f9j-ek3x-kbc5"},{"vulnerability":"VCID-658d-vmwt-f7e8"},{"vulnerability":"VCID-77at-thqm-c3bg"},{"vulnerability":"VCID-agbu-v7vd-fyc8"},{"vulnerability":"VCID-c3vp-kc9a-vkhn"},{"vulnerability":"VCID-g366-c4n9-vfcs"},{"vulnerability":"VCID-gme6-wj87-ekfw"},{"vulnerability":"VCID-j6ze-f76y-cqgy"},{"vulnerability":"VCID-jdyv-jdju-kbb2"},{"vulnerability":"VCID-kdyk-rrrr-pufw"},{"vulnerability":"VCID-kz63-ftzc-tudk"},{"vulnerability":"VCID-mr46-bvjx-n7ar"},{"vulnerability":"VCID-qdtk-twxp-2kbv"},{"vulnerability":"VCID-qjey-bhrt-kud4"},{"vulnerability":"VCID-rbft-1w3r-3ub7"},{"vulnerability":"VCID-t1eq-bsbe-77ht"},{"vulnerability":"VCID-wpu5-3h5v-wuhj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:composer/silverstripe/cms@3.1.10-rc1"},{"url":"http://public2.vulnerablecode.io/api/packages/20988?format=json","purl":"pkg:composer/silverstripe/cms@3.1.10","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2f9j-ek3x-kbc5"},{"vulnerability":"VCID-658d-vmwt-f7e8"},{"vulnerability":"VCID-agbu-v7vd-fyc8"},{"vulnerability":"VCID-c3vp-kc9a-vkhn"},{"vulnerability":"VCID-g366-c4n9-vfcs"},{"vulnerability":"VCID-gme6-wj87-ekfw"},{"vulnerability":"VCID-j6ze-f76y-cqgy"},{"vulnerability":"VCID-jdyv-jdju-kbb2"},{"vulnerability":"VCID-kdyk-rrrr-pufw"},{"vulnerability":"VCID-kz63-ftzc-tudk"},{"vulnerability":"VCID-mr46-bvjx-n7ar"},{"vulnerability":"VCID-qdtk-twxp-2kbv"},{"vulnerability":"VCID-qjey-bhrt-kud4"},{"vulnerability":"VCID-rbft-1w3r-3ub7"},{"vulnerability":"VCID-wpu5-3h5v-wuhj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:composer/silverstripe/cms@3.1.10"}],"aliases":["SS-2015-003-1"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zqu9-qfx1-sbcu"}],"risk_score":"4.5","resource_url":"http://public2.vulnerablecode.io/packages/pkg:composer/silverstripe/cms@3.1.10"}