Vulnerability Description
A stored cross-site scripting (XSS) vulnerability in the Edit Content Layout module of Kirby CMS v4.1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Link field. NOTE: the vendor's position is that this issue did not affect any version of Kirby CMS. The only effect was on the trykirby.com demo site, which is not customer-controlled.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Getkirby | Kirby | 4.1.0 |
Related Weaknesses (CWE)
References
- https://github.com/getkirby/demokit/commit/d4877a6715cbf6517cb04ff57798851ffbd0cPatch
- https://shrouded-trowel-50c.notion.site/Kirby-CMS-4-1-0-Stored-Cross-Site-ScriptExploitThird Party Advisory
- https://github.com/getkirby/demokit/commit/d4877a6715cbf6517cb04ff57798851ffbd0cPatch
- https://shrouded-trowel-50c.notion.site/Kirby-CMS-4-1-0-Stored-Cross-Site-ScriptExploitThird Party Advisory
FAQ
What is CVE-2024-26484?
CVE-2024-26484 is a vulnerability with a CVSS score of 6.1 (MEDIUM). A stored cross-site scripting (XSS) vulnerability in the Edit Content Layout module of Kirby CMS v4.1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into th...
How severe is CVE-2024-26484?
CVE-2024-26484 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-26484?
Check the references section above for vendor advisories and patch information. Affected products include: Getkirby Kirby.