
CVE-2024-26481
https://notcve.org/view.php?id=CVE-2024-26481
22 Feb 2024 — Kirby CMS v4.1.0 was discovered to contain a reflected self-XSS vulnerability via the URL parameter. Se descubrió que Kirby CMS v4.1.0 contenía una vulnerabilidad de Cross-Site Scripting (XSS) reflejado a través del parámetro URL. • https://github.com/getkirby/kirby/security/advisories/GHSA-57f2-8p89-66x6 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2024-26484
https://notcve.org/view.php?id=CVE-2024-26484
22 Feb 2024 — A stored cross-site scripting (XSS) vulnerability in the Edit Content Layout module of Kirby CMS v4.1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Link field. NOTE: the vendor's position is that this issue did not affect any version of Kirby CMS. The only effect was on the trykirby.com demo site, which is not customer-controlled. Una vulnerabilidad de Cross-Site Scripting (XSS) Almacenado en el módulo Edit Content Layout de Kirby CMS v4.1.0 permite a lo... • https://github.com/getkirby/demokit/commit/d4877a6715cbf6517cb04ff57798851ffbd0cd7e • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2023-38492 – Kirby vulnerable to denial of service from unlimited password lengths
https://notcve.org/view.php?id=CVE-2023-38492
27 Jul 2023 — Kirby is a content management system. A vulnerability in versions prior to 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, and 3.9.6 affects all Kirby sites with user accounts (unless Kirby's API and Panel are disabled in the config). The real-world impact of this vulnerability is limited, however we still recommend to update to one of the patch releases because they also fix more severe vulnerabilities. Kirby's authentication endpoint did not limit the password length. This allowed attackers to provide a password with... • https://github.com/getkirby/kirby/commit/0e10ce3b0c2b88656564b8ff518ddc99136ac43e • CWE-770: Allocation of Resources Without Limits or Throttling •

CVE-2023-38491 – Kirby vulnerable to Cross-site scripting (XSS) from MIME type auto-detection of uploaded files
https://notcve.org/view.php?id=CVE-2023-38491
27 Jul 2023 — Kirby is a content management system. A vulnerability in versions prior to 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, and 3.9.6 affects all Kirby sites that might have potential attackers in the group of authenticated Panel users or that allow external visitors to upload an arbitrary file to the content folder. Kirby sites are not affected if they don't allow file uploads for untrusted users or visitors or if the file extensions of uploaded files are limited to a fixed safe list. The attack requires user interacti... • https://github.com/getkirby/kirby/commit/2f06ba1c026bc91cb0702bc16b7d505642536d15 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2023-38490 – Kirby XML External Entity (XXE) vulnerability in the XML data handler
https://notcve.org/view.php?id=CVE-2023-38490
27 Jul 2023 — Kirby is a content management system. A vulnerability in versions prior to 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, and 3.9.6 only affects Kirby sites that use the `Xml` data handler (e.g. `Data::decode($string, 'xml')`) or the `Xml::parse()` method in site or plugin code. The Kirby core does not use any of the affected methods. XML External Entities (XXE) is a little used feature in the XML markup language that allows to include data from external files in an XML structure. • https://github.com/Acceis/exploit-CVE-2023-38490 • CWE-611: Improper Restriction of XML External Entity Reference CWE-776: Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') •

CVE-2023-38489 – Kirby vulnerable to Insufficient Session Expiration after a password change
https://notcve.org/view.php?id=CVE-2023-38489
27 Jul 2023 — Kirby is a content management system. A vulnerability in versions prior to 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, and 3.9.6 affects all Kirby sites with user accounts (unless Kirby's API and Panel are disabled in the config). It can only be abused if a Kirby user is logged in on a device or browser that is shared with potentially untrusted users or if an attacker already maliciously used a previous password to log in to a Kirby site as the affected user. Insufficient Session Expiration is when a web site permi... • https://github.com/getkirby/kirby/commit/7a0a2014c69fdb925ea02f30e7793bb50115e931 • CWE-613: Insufficient Session Expiration •

CVE-2023-38488 – Kirby vulnerable to field injection in the KirbyData text storage handler
https://notcve.org/view.php?id=CVE-2023-38488
27 Jul 2023 — Kirby is a content management system. A vulnerability in versions prior to 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, and 3.9.6 affects all Kirby sites that might have potential attackers in the group of authenticated Panel users or that allow external visitors to update a Kirby content file (e.g. via a contact or comment form). Kirby sites are *not* affected if they don't allow write access for untrusted users or visitors. A field injection in a content storage implementation is a type of vulnerability that allow... • https://github.com/getkirby/kirby/commit/a1e0f81c799ddae1af91cf37216f8ded9cb93540 • CWE-140: Improper Neutralization of Delimiters CWE-863: Incorrect Authorization •

CVE-2022-39315 – Kirby CMS vulnerable to user enumeration in the brute force protection
https://notcve.org/view.php?id=CVE-2022-39315
25 Oct 2022 — Kirby is a Content Management System. Prior to versions 3.5.8.2, 3.6.6.2, 3.7.5.1, and 3.8.1, a user enumeration vulnerability affects all Kirby sites with user accounts unless Kirby's API and Panel are disabled in the config. It can only be exploited for targeted attacks because the attack does not scale to brute force. The problem has been patched in Kirby 3.5.8.2, Kirby 3.6.6.2, Kirby 3.7.5.1, and Kirby 3.8.1. In all of the mentioned releases, the maintainers have rewritten the affected code so that the ... • https://github.com/getkirby/kirby/releases/tag/3.5.8.2 • CWE-204: Observable Response Discrepancy CWE-209: Generation of Error Message Containing Sensitive Information •

CVE-2022-39314 – User enumeration in the code-based login and password reset forms
https://notcve.org/view.php?id=CVE-2022-39314
24 Oct 2022 — Kirby is a flat-file CMS. In versions prior to 3.5.8.2, 3.6.6.2, 3.7.5.1, and 3.8.1, Kirby is subject to user enumeration due to Improper Restriction of Excessive Authentication Attempts. This vulnerability affects you only if you are using the `code` or `password-reset` auth method with the `auth.methods` option or if you have enabled the `debug` option in production. By using two or more IP addresses and multiple login attempts, valid user accounts will lock, but invalid accounts will not, leading to acco... • https://github.com/getkirby/kirby/security/advisories/GHSA-43qq-qw4x-28f8 • CWE-307: Improper Restriction of Excessive Authentication Attempts •

CVE-2022-36037 – Cross-site scripting (XSS) from dynamic options in the multiselect field in Kirby
https://notcve.org/view.php?id=CVE-2022-36037
29 Aug 2022 — kirby is a content management system (CMS) that adapts to many different projects and helps you build your own ideal interface. Cross-site scripting (XSS) is a type of vulnerability that allows execution of any kind of JavaScript code inside the Panel session of the same or other users. In the Panel, a harmful script can for example trigger requests to Kirby's API with the permissions of the victim. If bad actors gain access to your group of authenticated Panel users they can escalate their privileges via t... • https://github.com/getkirby/kirby/commit/b5b8863885e17556abc070dde1e20aec15fbfdf5 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •