silverstripe/framework vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the silverstripe/framework package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Information Exposure

>=3.0.0, <4.13.39 >=5.0.0, <5.1.11
  • M
Open Redirect

>=0.0.0
  • M
Weak Password Requirements

<4.13.14 >=5.0.0, <5.0.13
  • M
Insecure Permissions

>=4.0.0, <4.12.5
  • M
Open Redirect

>=4.0.0, <4.12.5
  • M
Cross-site Scripting (XSS)

>=3.0.0, <4.11.13
  • M
Cross-site Scripting (XSS)

>=3.0.0, <4.11.13
  • H
SQL Injection

>=3.0.0, <4.10.11 >=4.11.0, <4.11.14
  • M
Cross-site Scripting (XSS)

>=3.0.0, <4.11.13
  • M
Cross-site Scripting (XSS)

>=4.0.0, <4.11.13
  • M
Denial of Service (DoS)

<4.10.9
  • M
Cross-site Scripting (XSS)

<4.10.9
  • M
Cross-site Scripting (XSS)

<4.10.9
  • L
Improper Input Validation

>=4.8.0-beta1, <4.8.0 >=3.0.0, <4.7.4
  • L
XML External Entity (XXE) Injection

>=4.8.0-beta1, <4.8.0 <4.7.4
  • M
Cache Poisoning

>=4.0.0, <4.4.7 >=4.5.0, <4.5.4 >=3.0.0, <3.7.5
  • M
Cross-site Scripting (XSS)

>=3.0.0, <3.7.5
  • M
Information Exposure

<4.4.6 >=4.5.0, <4.5.3
  • H
Cross-site Scripting (XSS)

>=4.4.0, <4.4.5 >=4.5.0, <4.5.2
  • M
Information Exposure

>=4.0.0, <4.0.4
  • H
Cross-site Scripting (XSS)

>=3.3.2, <3.3.3 >=3.4.0, <3.4.1
  • C
Information Exposure

>=4.0.0, <4.0.1
  • M
Improper Access Control

>=3.1.19, <3.1.20 >=3.2.4, <3.2.5 >=3.3.2, <3.3.3 >=3.4.0, <3.4.1
  • M
Improper Authentication

>=3.1.19, <3.1.20 >=3.2.4, <3.2.5 >=3.3.2, <3.3.3 >=3.4.0, <3.4.1
  • C
Unrestricted Upload

>=3.6.5, <3.6.6 >=4.0.3, <4.0.4 >=4.1.0, <4.1.1
  • L
Improper Restriction of Excessive Authentication Attempts

>=3.1.18, <3.1.19 >=3.2.3, <3.2.4 >=3.3.1, <3.3.2
  • M
Session Hijacking

>=3.5.0, <3.5.6 >=3.6.0, <3.6.3
  • H
Cross-site Scripting (XSS)

>=3.1.0, <3.1.21 >=3.2.0, <3.2.6 >=3.3.0, <3.3.4 >=3.4.0, <3.4.2
  • H
Denial of Service (DoS)

>=4.0.0, <4.0.5 >=4.1.0, <4.1.3 >=4.2.0, <4.2.2
  • C
Cross-site Scripting (XSS)

>=3.1.18, <3.1.19 >=3.2.3, <3.2.4 >=3.3.1, <3.3.2
  • H
Cross-site Scripting (XSS)

<3.4.4 >=3.5.0, <3.5.2
  • H
Cross-site Scripting (XSS)

<3.4.6 >=3.5.0, <3.5.4
  • H
Cross-site Scripting (XSS)

>=3.1.19, <3.1.20 >=3.2.4, <3.2.5 >=3.3.2, <3.3.3 >=3.4.0, <3.4.1
  • H
Cross-site Scripting (XSS)

>=3.1.18, <3.1.19 >=3.2.3, <3.2.4 >=3.3.1, <3.3.2
  • H
Cross-site Scripting (XSS)

<3.4.6 >=3.5.0, <3.5.4
  • C
SQL Injection

<3.5.6 >=3.6.0, <3.6.3 >=4.0.0, <4.0.1
  • H
Privilege Escalation

>=3.5.7, <3.5.8 >=3.6.0, <3.6.6 >=4.0.0, <4.0.4 >=4.1.0, <4.1.1
  • C
Open Redirect

>=4.0.0, <4.0.4
  • H
Arbitrary Code Execution

>=4.0.3, <4.0.4 >=4.1.0, <4.1.1
  • M
Information Exposure

>=4.0.0, <4.0.4 >=4.1.0, <4.1.1
  • C
Cross-site Scripting (XSS)

>=3.1.9, <3.1.20 >=3.2.4, <3.2.5 >=3.3.2, <3.3.3 >=3.4.0, <3.4.1
  • H
Information Exposure

>=3.5.0, <3.5.5 >=3.6.0, <3.6.2
  • H
CSV Injection

>=3.5.0, <3.5.6 >=3.6.0, <3.6.3 >=4.0.0, <4.0.1
  • M
Information Exposure

>=3.4.0, <3.4.6 >=3.5.0, <3.5.4
  • H
Cross-site Request Forgery (CSRF)

>=3.1.18, <3.1.19 >=3.2.3, <3.2.4 >=3.3.1, <3.3.2
  • M
Information Exposure

>=3.7.0, <3.7.1 >=4.0.0, <4.0.5 >=4.1.0, <4.1.3 >=4.2.0, <4.2.2
  • M
Cross-site Scripting (XSS)

>=3.0.0, <4.3.5 >=4.4.0, <4.4.4
  • M
Cross-site Scripting (XSS)

>=4.0.0, <4.3.5 >=4.4.0, <4.4.4
  • M
Improper Access Control

>=4.4.0, <4.4.4 >=4.3.0, <4.3.6
  • C
Incorrect Access Control

>=4.1.0, <4.3.6 >=4.4.0, <4.4.4
  • L
Session Fixation

>=3.6.0, <3.6.8 >=3.7.0, <3.7.4 >=4.3.0, <4.3.6 >=4.4.0, <4.4.4
  • M
Denial of Service (DoS)

>=4.0.0, <4.4.0
  • H
SQL Injection

>=3.6.0, <3.6.7 >=3.7.0, <3.7.3 >=4.0.0, <4.0.7 >=4.1.0, <4.1.5 >=4.2.0, <4.2.4 >=4.3.0, <4.3.1
  • M
Access Restriction Bypass

<2.3.10 >=2.4.0, <2.4.4
  • M
IP and Protocol Spoofing

<3.1.17 >=3.2.0, <3.2.2 >=3.3-alpha, <3.3.0
  • L
Access Restriction Bypass

<3.1.17 >=3.2.0, <3.2.2 >=3.3-alpha, <3.3.0
  • M
Cross-site Request Forgery (CSRF)

<3.1.17 >=3.2.0, <3.2.2 >=3.3-alpha, <3.3.0
  • L
Cross-site Scripting (XSS)

<3.2.1
  • M
Cross-site Scripting (XSS)

<3.1.16 >=3.2.0, <3.2.1
  • M
Cross-site Scripting (XSS)

<3.1.14
  • M
Cross-site Scripting (XSS)

<3.1.14
  • M
HTTP Hostname Injection

<3.1.13
  • M
Access Restriction Bypass

>=3.1.0, <3.1.13 <3.0.14
  • M
Open Redirect

>=3.1.0, <3.1.13 <3.0.14
  • M
SQL Injection

>=3.1.0, <3.1.13 <3.0.14
  • M
Cross-site Scripting (XSS)

<3.1.12
  • M
Cross-site Scripting (XSS)

>=3.1.0, <3.1.12 <3.0.13
  • H
Arbitrary Code Injection

>=3.1.0, <3.1.12 <3.0.13
  • M
Cross-site Scripting (XSS)

<3.1.10
  • M
Cross-site Scripting (XSS)

<3.1.10
  • M
Cross-site Scripting (XSS)

<3.1.10
  • L
Quadratic Blowup Attack

<3.1.12