// For flags

CVE-2021-32735

Cross-site scripting (XSS) from field and configuration text displayed in the Panel

Severity Score

5.4
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Kirby is a content management system. In Kirby CMS versions 3.5.5 and 3.5.6, the Panel's `ListItem` component (used in the pages and files section for example) displayed HTML in page titles as it is. This could be used for cross-site scripting (XSS) attacks. Malicious authenticated Panel users can escalate their privileges if they get access to the Panel session of an admin user. Visitors without Panel access can use the attack vector if the site allows changing site data from a frontend form. Kirby 3.5.7 patches the vulnerability. As a partial workaround, site administrators can protect against attacks from visitors without Panel access by validating or sanitizing provided data from the frontend form.

Kirby es un sistema de administración de contenidos. En las versiones 3.5.5 y 3.5.6 de Kirby CMS, el componente "ListItem" del Panel (usado en la sección de páginas y archivos, por ejemplo) mostraba HTML en los títulos de las páginas tal cual. Esto podía ser usado para ataques de tipo cross-site scripting (XSS). Unos usuarios autenticados maliciosos del Panel pueden escalar sus privilegios si consiguen acceder a la sesión del Panel de un usuario administrador. Unos visitantes sin acceso al Panel pueden usar el vector de ataque si el sitio permite cambiar los datos del sitio desde un formulario del frontend. Kirby versión 3.5.7 parchea la vulnerabilidad. Como solución alternativa parcial, los administradores del sitio pueden protegerse contra los ataques de visitantes sin acceso al Panel al comprobar o sanear los datos proporcionados desde el formulario frontend

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
Single
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-05-12 CVE Reserved
  • 2021-07-02 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
  • CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Getkirby
Search vendor "Getkirby"
Kirby
Search vendor "Getkirby" for product "Kirby"
< 3.5.7
Search vendor "Getkirby" for product "Kirby" and version " < 3.5.7"
-
Affected