VYPR
Moderate severityNVD Advisory· Published Feb 26, 2024· Updated Aug 2, 2024

Kirby cross-site scripting (XSS) in the link field "Custom" type

CVE-2024-27087

Description

Kirby is a content management system. The new link field introduced in Kirby 4 allows several different link types that each validate the entered link to the relevant URL format. It also includes a "Custom" link type for advanced use cases that don't fit any of the pre-defined link formats. As the "Custom" link type is meant to be flexible, it also allows the javascript: URL scheme. In some use cases this can be intended, but it can also be misused by attackers to execute arbitrary JavaScript code when a user or visitor clicks on a link that is generated from the contents of the link field. This vulnerability is patched in 4.1.1.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
getkirby/cmsPackagist
>= 4.0.0, < 4.1.14.1.1

Affected products

1

Patches

1
cda3dd9a1522

Link field: Don’t allow custom type by default

https://github.com/getkirby/kirbyLukas BestleFeb 17, 2024via ghsa
2 files changed · +2 4
  • config/fields/link.php+1 2 modified
    @@ -22,8 +22,7 @@
     				'file',
     				'email',
     				'tel',
    -				'anchor',
    -				'custom'
    +				'anchor'
     			];
     		},
     		'value' => function (string|null $value = null) {
    
  • tests/Form/Fields/LinkFieldTest.php+1 2 modified
    @@ -26,8 +26,7 @@ public function testDefaultProps()
     			'file',
     			'email',
     			'tel',
    -			'anchor',
    -			'custom'
    +			'anchor'
     		], $field->options());
     	}
     }
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

5

News mentions

0

No linked articles in our index yet.