CVE-2024-27087
CVSS V2 None
CVSS V3 None
Description
Kirby is a content management system. The new link field introduced in Kirby 4 allows several different link types that each validate the entered link to the relevant URL format. It also includes a "Custom" link type for advanced use cases that don't fit any of the pre-defined link formats. As the "Custom" link type is meant to be flexible, it also allows the javascript: URL scheme. In some use cases this can be intended, but it can also be misused by attackers to execute arbitrary JavaScript code when a user or visitor clicks on a link that is generated from the contents of the link field. This vulnerability is patched in 4.1.1.
Overview
- CVE ID
- CVE-2024-27087
- Assigner
- GitHub_M
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-02-26T16:44:31.105Z
- Last Modified Date
- 2024-02-26T16:44:31.105Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://github.com/getkirby/kirby/security/advisories/GHSA-63h4-w25c-3qv4 | x_refsource_CONFIRM |
https://github.com/getkirby/kirby/commit/cda3dd9a15228d35e62ff86cfa87a67e7c687437 | x_refsource_MISC |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-27087 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27087 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-26 01:29:58 | Added to TrackCVE |