CVE-2025-30148: Silverstripe Framework has a XSS vulnerability in HTML editor
A bad actor with access to edit content in the CMS could send a specifically crafted encoded payload to the server, which could be used to inject a JavaScript payload on the front end of the site. The payload would be sanitised on the client-side, but server-side sanitisation doesn’t catch it.
The server-side sanitisation logic has been updated to sanitise against this attack.
References
- github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/framework/CVE-2025-30148.yaml
- github.com/advisories/GHSA-rhx4-hvx9-j387
- github.com/silverstripe/silverstripe-framework
- github.com/silverstripe/silverstripe-framework/commit/e99cfd62d160d145a76fcf9631e6b11226e42358
- github.com/silverstripe/silverstripe-framework/pull/11682
- github.com/silverstripe/silverstripe-framework/security/advisories/GHSA-rhx4-hvx9-j387
- nvd.nist.gov/vuln/detail/CVE-2025-30148
- www.silverstripe.org/download/security-releases/cve-2025-30148
Code Behaviors & Features
Detect and mitigate CVE-2025-30148 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →