Kirby CMS has cross-site scripting (XSS) in the changes dialog
Description
Kirby is an open-source content management system. From versions 5.0.0 to 5.1.3, attackers could change the title of any page or the name of any user to a malicious string. Then they could modify any content field of the same model without saving, making the model a candidate for display in the "Changes" dialog. If another authenticated user subsequently opened the dialog in their Panel, the malicious code would be executed. This vulnerability affects all Kirby 5 sites that might have potential attackers in the group of authenticated Panel users or that allow external visitors to update page titles or usernames. The attack requires user interaction by another Panel user and cannot be automated. This issue has been patched in version 5.1.4.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
getkirby/cmsPackagist | >= 5.0.0, < 5.1.4 | 5.1.4 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-84hf-8gh5-575jghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-65012ghsaADVISORY
- github.com/getkirby/kirby/releases/tag/5.1.4ghsax_refsource_MISCWEB
- github.com/getkirby/kirby/security/advisories/GHSA-84hf-8gh5-575jghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.