CVE-2022-38145: n/a in n/a
Silverstripe silverstripe/framework through 4.11 allows XSS (issue 1 of 3) via remote attackers adding a Javascript payload to a page's meta description and get it executed in the versioned history compare view.
AI Analysis
Technical Summary
CVE-2022-38145 is a cross-site scripting (XSS) vulnerability identified in the Silverstripe CMS framework, specifically affecting versions up to 4.11. The vulnerability allows remote attackers to inject malicious JavaScript payloads into a page's meta description field. This injected script is then executed in the context of the versioned history compare view, a feature used to compare different versions of content within the CMS. The attack vector requires the attacker to have low privileges (PR:L) and some user interaction (UI:R), such as convincing an authorized user to view the affected version comparison page. The vulnerability exploits improper sanitization or encoding of user-supplied input in the meta description field, which is reflected in the version history comparison interface without adequate escaping. The CVSS 3.1 base score is 5.4 (medium severity), with an attack vector of network (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), user interaction (UI:R), and impacting confidentiality and integrity with no impact on availability. The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component. No known exploits are currently reported in the wild, and no official patches are linked, suggesting that mitigation may rely on configuration or manual updates. The vulnerability is classified under CWE-79, which corresponds to improper neutralization of input leading to XSS.
Potential Impact
For European organizations using Silverstripe CMS, particularly versions up to 4.11, this vulnerability poses a risk of client-side script execution within administrative or editorial interfaces. Successful exploitation could allow attackers to steal session tokens, perform actions on behalf of authenticated users, or manipulate content integrity within the CMS environment. This could lead to unauthorized disclosure of sensitive information, defacement of web content, or further pivoting within the network if administrative credentials are compromised. Given that the vulnerability requires low privileges but user interaction, the risk is higher in environments where multiple users have editing rights and routinely review version histories. Organizations in sectors such as media, government, and education that rely on Silverstripe for content management may face reputational damage and operational disruption. The confidentiality and integrity impacts are moderate, with no direct availability impact. However, the changed scope indicates potential for broader impact beyond the immediate component, possibly affecting other integrated systems or services relying on the CMS.
Mitigation Recommendations
1. Upgrade Silverstripe CMS to the latest version beyond 4.11 where this vulnerability is addressed, as vendor patches or updates may have been released post-disclosure. 2. Implement strict input validation and output encoding on all user-supplied metadata fields, especially the meta description, to prevent injection of executable scripts. 3. Restrict editing privileges to trusted users only and enforce the principle of least privilege to reduce the risk of malicious input insertion. 4. Educate content editors and administrators about the risks of XSS and the importance of cautious interaction with version history comparison views. 5. Monitor logs for unusual activity related to version history views or meta description changes. 6. If upgrading is not immediately feasible, consider disabling or restricting access to the versioned history compare feature to limit exposure. 7. Employ Content Security Policy (CSP) headers to reduce the impact of potential XSS by restricting script execution sources. 8. Conduct regular security assessments and code reviews focused on input handling in CMS components.
Affected Countries
United Kingdom, Germany, France, Netherlands, Sweden, Belgium, Denmark
CVE-2022-38145: n/a in n/a
Description
Silverstripe silverstripe/framework through 4.11 allows XSS (issue 1 of 3) via remote attackers adding a Javascript payload to a page's meta description and get it executed in the versioned history compare view.
AI-Powered Analysis
Technical Analysis
CVE-2022-38145 is a cross-site scripting (XSS) vulnerability identified in the Silverstripe CMS framework, specifically affecting versions up to 4.11. The vulnerability allows remote attackers to inject malicious JavaScript payloads into a page's meta description field. This injected script is then executed in the context of the versioned history compare view, a feature used to compare different versions of content within the CMS. The attack vector requires the attacker to have low privileges (PR:L) and some user interaction (UI:R), such as convincing an authorized user to view the affected version comparison page. The vulnerability exploits improper sanitization or encoding of user-supplied input in the meta description field, which is reflected in the version history comparison interface without adequate escaping. The CVSS 3.1 base score is 5.4 (medium severity), with an attack vector of network (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), user interaction (UI:R), and impacting confidentiality and integrity with no impact on availability. The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component. No known exploits are currently reported in the wild, and no official patches are linked, suggesting that mitigation may rely on configuration or manual updates. The vulnerability is classified under CWE-79, which corresponds to improper neutralization of input leading to XSS.
Potential Impact
For European organizations using Silverstripe CMS, particularly versions up to 4.11, this vulnerability poses a risk of client-side script execution within administrative or editorial interfaces. Successful exploitation could allow attackers to steal session tokens, perform actions on behalf of authenticated users, or manipulate content integrity within the CMS environment. This could lead to unauthorized disclosure of sensitive information, defacement of web content, or further pivoting within the network if administrative credentials are compromised. Given that the vulnerability requires low privileges but user interaction, the risk is higher in environments where multiple users have editing rights and routinely review version histories. Organizations in sectors such as media, government, and education that rely on Silverstripe for content management may face reputational damage and operational disruption. The confidentiality and integrity impacts are moderate, with no direct availability impact. However, the changed scope indicates potential for broader impact beyond the immediate component, possibly affecting other integrated systems or services relying on the CMS.
Mitigation Recommendations
1. Upgrade Silverstripe CMS to the latest version beyond 4.11 where this vulnerability is addressed, as vendor patches or updates may have been released post-disclosure. 2. Implement strict input validation and output encoding on all user-supplied metadata fields, especially the meta description, to prevent injection of executable scripts. 3. Restrict editing privileges to trusted users only and enforce the principle of least privilege to reduce the risk of malicious input insertion. 4. Educate content editors and administrators about the risks of XSS and the importance of cautious interaction with version history comparison views. 5. Monitor logs for unusual activity related to version history views or meta description changes. 6. If upgrading is not immediately feasible, consider disabling or restricting access to the versioned history compare feature to limit exposure. 7. Employ Content Security Policy (CSP) headers to reduce the impact of potential XSS by restricting script execution sources. 8. Conduct regular security assessments and code reviews focused on input handling in CMS components.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-08-10T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d983ec4522896dcbefc32
Added to database: 5/21/2025, 9:09:18 AM
Last enriched: 6/24/2025, 4:37:48 PM
Last updated: 2/4/2026, 4:41:47 PM
Views: 33
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20123: URL Redirection to Untrusted Site ('Open Redirect') in Cisco Cisco Evolved Programmable Network Manager (EPNM)
MediumCVE-2026-20119: Improper Validation of Specified Type of Input in Cisco Cisco RoomOS Software
HighCVE-2026-20111: Use of Hard-coded Credentials in Cisco Cisco Prime Infrastructure
MediumCVE-2026-20098: Unrestricted Upload of File with Dangerous Type in Cisco Cisco Meeting Management
HighCVE-2026-20056: Download of Code Without Integrity Check in Cisco Cisco Secure Web Appliance
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.