Proof of Concept
To illustrate this vulnerability, the following XSS payload was used when submitting an entry through the Silverstripe Form Message functionality.
Initially, the payload does not execute because Silverstripe applies input sanitisation after the entry is created. However, when the entry is deleted, the resulting notification fails to sanitise the content — causing the XSS payload to execute.
Potential Impact
A malicious actor with low-level access to the CMS could exploit this XSS flaw by injecting a payload into form messages. If an administrator deletes that entry, the script executes within their browser session, potentially allowing privilege escalation or theft of sensitive data under the administrator’s permissions.
Remediation
The vulnerability is resolved in Silverstripe version 5.3.8 and above. Users are strongly advised to upgrade to the latest release. Full details are available on the Silverstripe Security Advisory for CVE-2024-53277.
Vulnerability Disclosure Timeline
- 26 Nov 2024 – Issue reported to Silverstripe
- 15 Jan 2025 – Patch released and CVE-2024-53277 assigned
- 22 Jan 2025 – Public disclosure