
CVE-2024-41964 – Insufficient permission checks in the language settings in Kirby CMS
https://notcve.org/view.php?id=CVE-2024-41964
29 Aug 2024 — Kirby is a CMS targeting designers and editors. Kirby allows to restrict the permissions of specific user roles. Users of that role can only perform permitted actions. Permissions for creating and deleting languages have already existed and could be configured, but were not enforced by Kirby's frontend or backend code. A permission for updating existing languages has not existed before the patched versions. • https://github.com/getkirby/kirby/commit/ab95d172667c3cd529917c2bc94d3c7969706d23 • CWE-863: Incorrect Authorization •

CVE-2024-27087 – Kirby cross-site scripting (XSS) in the link field "Custom" type
https://notcve.org/view.php?id=CVE-2024-27087
26 Feb 2024 — Kirby is a content management system. The new link field introduced in Kirby 4 allows several different link types that each validate the entered link to the relevant URL format. It also includes a "Custom" link type for advanced use cases that don't fit any of the pre-defined link formats. As the "Custom" link type is meant to be flexible, it also allows the javascript: URL scheme. In some use cases this can be intended, but it can also be misused by attackers to execute arbitrary JavaScript code when a us... • https://github.com/getkirby/kirby/commit/cda3dd9a15228d35e62ff86cfa87a67e7c687437 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2024-26481
https://notcve.org/view.php?id=CVE-2024-26481
22 Feb 2024 — Kirby CMS v4.1.0 was discovered to contain a reflected self-XSS vulnerability via the URL parameter. Se descubrió que Kirby CMS v4.1.0 contenía una vulnerabilidad de Cross-Site Scripting (XSS) reflejado a través del parámetro URL. • https://github.com/getkirby/kirby/security/advisories/GHSA-57f2-8p89-66x6 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2024-26484
https://notcve.org/view.php?id=CVE-2024-26484
22 Feb 2024 — A stored cross-site scripting (XSS) vulnerability in the Edit Content Layout module of Kirby CMS v4.1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Link field. NOTE: the vendor's position is that this issue did not affect any version of Kirby CMS. The only effect was on the trykirby.com demo site, which is not customer-controlled. Una vulnerabilidad de Cross-Site Scripting (XSS) Almacenado en el módulo Edit Content Layout de Kirby CMS v4.1.0 permite a lo... • https://github.com/getkirby/demokit/commit/d4877a6715cbf6517cb04ff57798851ffbd0cd7e • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2023-38492 – Kirby vulnerable to denial of service from unlimited password lengths
https://notcve.org/view.php?id=CVE-2023-38492
27 Jul 2023 — Kirby is a content management system. A vulnerability in versions prior to 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, and 3.9.6 affects all Kirby sites with user accounts (unless Kirby's API and Panel are disabled in the config). The real-world impact of this vulnerability is limited, however we still recommend to update to one of the patch releases because they also fix more severe vulnerabilities. Kirby's authentication endpoint did not limit the password length. This allowed attackers to provide a password with... • https://github.com/getkirby/kirby/commit/0e10ce3b0c2b88656564b8ff518ddc99136ac43e • CWE-770: Allocation of Resources Without Limits or Throttling •

CVE-2023-38491 – Kirby vulnerable to Cross-site scripting (XSS) from MIME type auto-detection of uploaded files
https://notcve.org/view.php?id=CVE-2023-38491
27 Jul 2023 — Kirby is a content management system. A vulnerability in versions prior to 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, and 3.9.6 affects all Kirby sites that might have potential attackers in the group of authenticated Panel users or that allow external visitors to upload an arbitrary file to the content folder. Kirby sites are not affected if they don't allow file uploads for untrusted users or visitors or if the file extensions of uploaded files are limited to a fixed safe list. The attack requires user interacti... • https://github.com/getkirby/kirby/commit/2f06ba1c026bc91cb0702bc16b7d505642536d15 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2023-38490 – Kirby XML External Entity (XXE) vulnerability in the XML data handler
https://notcve.org/view.php?id=CVE-2023-38490
27 Jul 2023 — Kirby is a content management system. A vulnerability in versions prior to 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, and 3.9.6 only affects Kirby sites that use the `Xml` data handler (e.g. `Data::decode($string, 'xml')`) or the `Xml::parse()` method in site or plugin code. The Kirby core does not use any of the affected methods. XML External Entities (XXE) is a little used feature in the XML markup language that allows to include data from external files in an XML structure. • https://github.com/Acceis/exploit-CVE-2023-38490 • CWE-611: Improper Restriction of XML External Entity Reference CWE-776: Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') •

CVE-2023-38489 – Kirby vulnerable to Insufficient Session Expiration after a password change
https://notcve.org/view.php?id=CVE-2023-38489
27 Jul 2023 — Kirby is a content management system. A vulnerability in versions prior to 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, and 3.9.6 affects all Kirby sites with user accounts (unless Kirby's API and Panel are disabled in the config). It can only be abused if a Kirby user is logged in on a device or browser that is shared with potentially untrusted users or if an attacker already maliciously used a previous password to log in to a Kirby site as the affected user. Insufficient Session Expiration is when a web site permi... • https://github.com/getkirby/kirby/commit/7a0a2014c69fdb925ea02f30e7793bb50115e931 • CWE-613: Insufficient Session Expiration •

CVE-2023-38488 – Kirby vulnerable to field injection in the KirbyData text storage handler
https://notcve.org/view.php?id=CVE-2023-38488
27 Jul 2023 — Kirby is a content management system. A vulnerability in versions prior to 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, and 3.9.6 affects all Kirby sites that might have potential attackers in the group of authenticated Panel users or that allow external visitors to update a Kirby content file (e.g. via a contact or comment form). Kirby sites are *not* affected if they don't allow write access for untrusted users or visitors. A field injection in a content storage implementation is a type of vulnerability that allow... • https://github.com/getkirby/kirby/commit/a1e0f81c799ddae1af91cf37216f8ded9cb93540 • CWE-140: Improper Neutralization of Delimiters CWE-863: Incorrect Authorization •

CVE-2017-20174 – bastianallgeier Kirby Webmentions Plugin injection
https://notcve.org/view.php?id=CVE-2017-20174
19 Jan 2023 — A vulnerability was found in bastianallgeier Kirby Webmentions Plugin and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to injection. The attack may be launched remotely. The complexity of an attack is rather high. • https://github.com/bastianallgeier/kirby-webmentions/commit/55bedea78ae9af916a9a41497bd9996417851502 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •