An attacker could inject a XSS payload in a Silverstripe CMS response by carefully crafting a return URL on a /dev/build or /Security/login request.
To exploit this vulnerability, an attacker would need to convince a user to follow a link with a malicious payload.
This will only affect projects configured to output PHP warnings to the browser. By default, Silverstripe CMS will only output PHP warnings if your SSENVIRONMENTTYPE environment variable is set to dev. Production sites should always set SSENVIRONMENTTYPE to live.
{ "nvd_published_at": "2022-11-22T13:15:00Z", "github_reviewed_at": "2022-11-21T23:59:56Z", "severity": "MODERATE", "github_reviewed": true, "cwe_ids": [ "CWE-79" ] }