CVE-2025-65012

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-65012
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-65012.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-65012
Aliases
Published
2025-11-18T22:44:11.989Z
Modified
2025-11-21T08:52:06.332265Z
Severity
  • 5.1 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N CVSS Calculator
Summary
Kirby CMS has cross-site scripting (XSS) in the changes dialog
Details

Kirby is an open-source content management system. From versions 5.0.0 to 5.1.3, attackers could change the title of any page or the name of any user to a malicious string. Then they could modify any content field of the same model without saving, making the model a candidate for display in the "Changes" dialog. If another authenticated user subsequently opened the dialog in their Panel, the malicious code would be executed. This vulnerability affects all Kirby 5 sites that might have potential attackers in the group of authenticated Panel users or that allow external visitors to update page titles or usernames. The attack requires user interaction by another Panel user and cannot be automated. This issue has been patched in version 5.1.4.

Database specific
{
    "cwe_ids": [
        "CWE-79"
    ]
}
References

Affected packages

Git / github.com/getkirby/kirby

Affected ranges

Type
GIT
Repo
https://github.com/getkirby/kirby
Events

Affected versions

5.*

5.0.0
5.0.1
5.0.2
5.0.3
5.0.4
5.1.0
5.1.0-rc.1
5.1.1
5.1.2
5.1.3