CVE-2022-38145: n/a in n/a
Silverstripe silverstripe/framework through 4.11 allows XSS (issue 1 of 3) via remote attackers adding a Javascript payload to a page's meta description and get it executed in the versioned history compare view.
AI Analysis
Technical Summary
CVE-2022-38145 is a cross-site scripting (XSS) vulnerability identified in the Silverstripe CMS framework, specifically affecting versions up to 4.11. The vulnerability allows remote attackers to inject malicious JavaScript payloads into a page's meta description field. This injected script is then executed in the context of the versioned history compare view, a feature used to compare different versions of content within the CMS. The attack vector requires the attacker to have low privileges (PR:L) and some user interaction (UI:R), such as convincing an authorized user to view the affected version comparison page. The vulnerability exploits improper sanitization or encoding of user-supplied input in the meta description field, which is reflected in the version history comparison interface without adequate escaping. The CVSS 3.1 base score is 5.4 (medium severity), with an attack vector of network (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), user interaction (UI:R), and impacting confidentiality and integrity with no impact on availability. The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component. No known exploits are currently reported in the wild, and no official patches are linked, suggesting that mitigation may rely on configuration or manual updates. The vulnerability is classified under CWE-79, which corresponds to improper neutralization of input leading to XSS.
Potential Impact
For European organizations using Silverstripe CMS, particularly versions up to 4.11, this vulnerability poses a risk of client-side script execution within administrative or editorial interfaces. Successful exploitation could allow attackers to steal session tokens, perform actions on behalf of authenticated users, or manipulate content integrity within the CMS environment. This could lead to unauthorized disclosure of sensitive information, defacement of web content, or further pivoting within the network if administrative credentials are compromised. Given that the vulnerability requires low privileges but user interaction, the risk is higher in environments where multiple users have editing rights and routinely review version histories. Organizations in sectors such as media, government, and education that rely on Silverstripe for content management may face reputational damage and operational disruption. The confidentiality and integrity impacts are moderate, with no direct availability impact. However, the changed scope indicates potential for broader impact beyond the immediate component, possibly affecting other integrated systems or services relying on the CMS.
Mitigation Recommendations
1. Upgrade Silverstripe CMS to the latest version beyond 4.11 where this vulnerability is addressed, as vendor patches or updates may have been released post-disclosure. 2. Implement strict input validation and output encoding on all user-supplied metadata fields, especially the meta description, to prevent injection of executable scripts. 3. Restrict editing privileges to trusted users only and enforce the principle of least privilege to reduce the risk of malicious input insertion. 4. Educate content editors and administrators about the risks of XSS and the importance of cautious interaction with version history comparison views. 5. Monitor logs for unusual activity related to version history views or meta description changes. 6. If upgrading is not immediately feasible, consider disabling or restricting access to the versioned history compare feature to limit exposure. 7. Employ Content Security Policy (CSP) headers to reduce the impact of potential XSS by restricting script execution sources. 8. Conduct regular security assessments and code reviews focused on input handling in CMS components.
Affected Countries
United Kingdom, Germany, France, Netherlands, Sweden, Belgium, Denmark
CVE-2022-38145: n/a in n/a
Description
Silverstripe silverstripe/framework through 4.11 allows XSS (issue 1 of 3) via remote attackers adding a Javascript payload to a page's meta description and get it executed in the versioned history compare view.
AI-Powered Analysis
Technical Analysis
CVE-2022-38145 is a cross-site scripting (XSS) vulnerability identified in the Silverstripe CMS framework, specifically affecting versions up to 4.11. The vulnerability allows remote attackers to inject malicious JavaScript payloads into a page's meta description field. This injected script is then executed in the context of the versioned history compare view, a feature used to compare different versions of content within the CMS. The attack vector requires the attacker to have low privileges (PR:L) and some user interaction (UI:R), such as convincing an authorized user to view the affected version comparison page. The vulnerability exploits improper sanitization or encoding of user-supplied input in the meta description field, which is reflected in the version history comparison interface without adequate escaping. The CVSS 3.1 base score is 5.4 (medium severity), with an attack vector of network (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), user interaction (UI:R), and impacting confidentiality and integrity with no impact on availability. The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component. No known exploits are currently reported in the wild, and no official patches are linked, suggesting that mitigation may rely on configuration or manual updates. The vulnerability is classified under CWE-79, which corresponds to improper neutralization of input leading to XSS.
Potential Impact
For European organizations using Silverstripe CMS, particularly versions up to 4.11, this vulnerability poses a risk of client-side script execution within administrative or editorial interfaces. Successful exploitation could allow attackers to steal session tokens, perform actions on behalf of authenticated users, or manipulate content integrity within the CMS environment. This could lead to unauthorized disclosure of sensitive information, defacement of web content, or further pivoting within the network if administrative credentials are compromised. Given that the vulnerability requires low privileges but user interaction, the risk is higher in environments where multiple users have editing rights and routinely review version histories. Organizations in sectors such as media, government, and education that rely on Silverstripe for content management may face reputational damage and operational disruption. The confidentiality and integrity impacts are moderate, with no direct availability impact. However, the changed scope indicates potential for broader impact beyond the immediate component, possibly affecting other integrated systems or services relying on the CMS.
Mitigation Recommendations
1. Upgrade Silverstripe CMS to the latest version beyond 4.11 where this vulnerability is addressed, as vendor patches or updates may have been released post-disclosure. 2. Implement strict input validation and output encoding on all user-supplied metadata fields, especially the meta description, to prevent injection of executable scripts. 3. Restrict editing privileges to trusted users only and enforce the principle of least privilege to reduce the risk of malicious input insertion. 4. Educate content editors and administrators about the risks of XSS and the importance of cautious interaction with version history comparison views. 5. Monitor logs for unusual activity related to version history views or meta description changes. 6. If upgrading is not immediately feasible, consider disabling or restricting access to the versioned history compare feature to limit exposure. 7. Employ Content Security Policy (CSP) headers to reduce the impact of potential XSS by restricting script execution sources. 8. Conduct regular security assessments and code reviews focused on input handling in CMS components.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-08-10T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d983ec4522896dcbefc32
Added to database: 5/21/2025, 9:09:18 AM
Last enriched: 6/24/2025, 4:37:48 PM
Last updated: 8/16/2025, 2:13:48 PM
Views: 13
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.