Vulnerabilities (CVE)

Filtered by vendor Silverstripe Subscribe
Total 87 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-12245 1 Silverstripe 1 Silverstripe 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
SilverStripe through 4.3.3 has incorrect access control for protected files uploaded via Upload::loadIntoFile(). An attacker may be able to guess a filename in silverstripe/assets via the AssetControlExtension.
CVE-2019-12205 1 Silverstripe 1 Silverstripe 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
SilverStripe through 4.3.3 has Flash Clipboard Reflected XSS.
CVE-2019-12204 1 Silverstripe 1 Silverstripe 2024-11-21 7.5 HIGH 9.8 CRITICAL
In SilverStripe through 4.3.3, a missing warning about leaving install.php in a public webroot can lead to unauthenticated admin access.
CVE-2019-12203 1 Silverstripe 1 Silverstripe 2024-11-21 3.7 LOW 6.3 MEDIUM
SilverStripe through 4.3.3 allows session fixation in the "change password" form.
CVE-2019-12149 1 Silverstripe 2 Registry, Restfulserver 2024-11-21 7.5 HIGH 9.8 CRITICAL
SQL injection vulnerability in silverstripe/restfulserver module 1.0.x before 1.0.9, 2.0.x before 2.0.4, and 2.1.x before 2.1.2 and silverstripe/registry module 2.1.x before 2.1.1 and 2.2.x before 2.2.1 allows attackers to execute arbitrary SQL commands.
CVE-2017-18049 1 Silverstripe 1 Silverstripe 2024-11-21 4.3 MEDIUM 5.5 MEDIUM
In the CSV export feature of SilverStripe before 3.5.6, 3.6.x before 3.6.3, and 4.x before 4.0.1, it's possible for the output to contain macros and scripts, which may be executed if imported without sanitization into common software (including Microsoft Excel). For example, the CSV data may contain untrusted user input from the "First Name" field of a user's /myprofile page.
CVE-2023-32302 1 Silverstripe 1 Framework 2024-02-05 N/A N/A
Silverstripe Framework is the MVC framework that powers Silverstripe CMS. When a new member record is created and a password is not set, an empty encrypted password is generated. As a result, if someone is aware of the existence of a member record associated with a specific email address, they can potentially attempt to log in using that empty password. Although the default member authenticator and login form require a non-empty password, alternative authentication methods might still permit a successful login with the empty password. This issue has been patched in versions 4.13.4 and 5.0.13.