Lucene search

K

4 matches found

CVE
CVE
added 2021/04/27 8:15 p.m.114 views

CVE-2021-29460

Kirby is an open source CMS. An editor with write access to the Kirby Panel can upload an SVG file that contains harmful content like [removed] tags. The direct link to that file can be sent to other users or visitors of the site. If the victim opens that link in a browser where they are logged in ...

7.6CVSS5.7AI score0.0112EPSS
CVE
CVE
added 2021/07/02 3:15 p.m.59 views

CVE-2021-32735

Kirby is a content management system. In Kirby CMS versions 3.5.5 and 3.5.6, the Panel's ListItem component (used in the pages and files section for example) displayed HTML in page titles as it is. This could be used for cross-site scripting (XSS) attacks. Malicious authenticated Panel users can es...

7.1CVSS5.4AI score0.00217EPSS
CVE
CVE
added 2021/11/16 6:15 p.m.51 views

CVE-2021-41258

Kirby is an open source file structured CMS. In affected versions Kirby's blocks field stores structured data for each block. This data is then used in block snippets to convert the blocks to HTML for use in your templates. We recommend to escape HTML special characters to protect against cross-sit...

7.3CVSS5.3AI score0.00382EPSS
CVE
CVE
added 2021/11/16 6:15 p.m.47 views

CVE-2021-41252

Kirby is an open source file structured CMS ### Impact Kirby's writer field stores its formatted content as HTML code. Unlike with other field types, it is not possible to escape HTML special characters against cross-site scripting (XSS) attacks, otherwise the formatting would be lost. If the user ...

7.3CVSS5.4AI score0.00328EPSS