CVE-2025-47280

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-47280
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-47280.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-47280
Aliases
Published
2025-05-13T17:06:56Z
Modified
2025-10-21T02:37:00Z
Severity
  • 2.3 (Low) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:H/SA:N/E:U CVSS Calculator
Summary
Umbraco.Forms has HTML injection vulnerability in 'Send email' workflow
Details

Umbraco Forms is a form builder that integrates with the Umbraco content management system. Starting in the 7.x branch and prior to versions 13.4.2 and 15.1.2, the 'Send email' workflow does not HTML encode the user-provided field values in the sent email message, making any form with this workflow configured vulnerable, as it allows sending the message from a trusted system and address, potentially bypassing spam and email client security systems. This issue affects all (supported) versions Umbraco Forms and is patched in 13.4.2 and 15.1.2. Unpatched or unsupported versions can workaround this issue by using the Send email with template (Razor) workflow instead or writing a custom workflow type. To avoid accidentally using the vulnerable workflow again, the SendEmail workflow type can be removed using a composer available in the GitHub Security Advisory for this vulnerability.

References

Affected packages

Git /

Affected ranges

Database specific

unresolved_versions

[
    {
        "type": "",
        "events": [
            {
                "introduced": "7.0.0"
            },
            {
                "fixed": "13.4.2"
            }
        ]
    },
    {
        "type": "",
        "events": [
            {
                "introduced": "15.0.0"
            },
            {
                "fixed": "15.1.2"
            }
        ]
    }
]

source

"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-47280.json"