An HTML injection vulnerability exists in the Edit Content Layout module of Kirby CMS v4.1.0. NOTE: the vendor disputes the significance of this report because some HTML formatting (such as with an H1 element) is allowed, but there is backend sanitization such that the reporter's mentioned "injecting malicious scripts" would not occur.
References
Link | Resource |
---|---|
https://shrouded-trowel-50c.notion.site/Kirby-CMS-4-1-0-HTML-Injection-19ca19686d0a4533ab4b0c53fc977eef?pvs=4 | Exploit Third Party Advisory |
https://shrouded-trowel-50c.notion.site/Kirby-CMS-4-1-0-HTML-Injection-19ca19686d0a4533ab4b0c53fc977eef?pvs=4 | Exploit Third Party Advisory |
Configurations
History
21 Aug 2025, 14:03
Type | Values Removed | Values Added |
---|---|---|
First Time |
Getkirby kirby
Getkirby |
|
CPE | cpe:2.3:a:getkirby:kirby:4.1.0:-:*:*:*:*:*:* | |
References | () https://shrouded-trowel-50c.notion.site/Kirby-CMS-4-1-0-HTML-Injection-19ca19686d0a4533ab4b0c53fc977eef?pvs=4 - Exploit, Third Party Advisory |
Information
Published : 2024-02-22 05:15
Updated : 2025-08-21 14:03
NVD link : CVE-2024-26482
Mitre link : CVE-2024-26482
CVE.ORG link : CVE-2024-26482
JSON object : View
Products Affected
getkirby
- kirby
CWE
CWE-80
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)