{"uuid": "3a8e398c-168e-4428-baad-848011f479e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47605", "type": "seen", "source": "https://t.me/cvedetector/15385", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47605 - Silverstripe Asset Admin Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-47605 \nPublished : Jan. 14, 2025, 11:15 p.m. | 37\u00a0minutes ago \nDescription : silverstripe-asset-admin is a silverstripe assets gallery for asset management. When using the \"insert media\" functionality, the linked oEmbed JSON includes an HTML attribute which will replace the embed shortcode. The HTML is not sanitized before replacing the shortcode, allowing a script payload to be executed on both the CMS and the front-end of the website. This issue has been addressed in silverstripe/framework version 5.3.8 and users are advised to upgrade. There are no known workarounds for this vulnerability. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-15T00:53:35.000000Z"}