CVE-2022-28803
Description
In SilverStripe Framework through 2022-04-07, Stored XSS can occur in javascript link tags added via XMLHttpRequest (XHR).
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
SilverStripe Framework through 2022-04-07 allows stored XSS via JavaScript link tags added through XMLHttpRequest.
Vulnerability
Overview CVE-2022-28803 is a stored cross-site scripting (XSS) vulnerability in the SilverStripe Framework, affecting versions up to the 2022-04-07 release. The flaw resides in how the framework handles JavaScript link tags added via XMLHttpRequest (XHR). When attacker-controlled content is inserted into a page through an XHR request, the framework fails to properly sanitize or escape the href attribute of `` tags, allowing arbitrary JavaScript execution upon page load [1][2].
Attack
Vector and Prerequisites Exploitation requires the ability to inject malicious content into a SilverStripe application, typically through a user-controllable input that is later rendered as part of a page. The attacker must be able to supply a crafted href value in a `` tag that is included via XHR. No authentication is strictly required if the application allows anonymous submissions; however, the attack surface depends on the application's specific features. The XHR endpoint itself does not need to be vulnerable, but the stored content that is later retrieved and rendered must be untrusted [2].
Impact
A successful attack allows an attacker to execute arbitrary JavaScript in the context of any user who views the affected page. This can lead to session hijacking, credential theft, defacement, or other client-side attacks. The vulnerability is classified as stored XSS, meaning the malicious payload persists across sessions and can affect multiple users [1][2].
Mitigation
Status As of the publication date (2022-06-29), no patch had been released for the affected versions. Users are advised to upgrade to the latest patched version of SilverStripe Framework once available, or to apply input sanitization and output encoding to all data that is rendered via XHR responses. The vulnerability is not currently listed in CISA's Known Exploited Vulnerabilities catalog.
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
silverstripe/frameworkPackagist | >= 4.0.0, < 4.10.9 | 4.10.9 |
Affected products
3- SilverStripe/Frameworkdescription
- osv-coords2 versions
< 4.10.9+ 1 more
- (no CPE)range: < 4.10.9
- (no CPE)range: >= 4.0.0, < 4.10.9
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-rppc-655v-7j3cghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2022-28803ghsaADVISORY
- github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/framework/CVE-2022-28803.yamlghsaWEB
- silverstripe.orgmitrex_refsource_MISC
- www.silverstripe.org/download/security-releases/cve-2022-28803ghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.