GHSA-M7GW-RFFQ-RXJM

Vulnerability from github – Published: 2026-02-04 21:32 – Updated: 2026-02-06 21:42
VLAI?
Summary
Winter CMS has Stored Cross-site Scripting (XSS) in Asset Manager
Details

Impact

Affected versions of Winter CMS allow users with access to the CMS Asset Manager were able to upload SVGs without automatic sanitization.

To actively exploit this security issue, an attacker would need access to the Backend with a user account with the following permission: cms.manage_assets

The Winter CMS maintainers strongly recommend that the cms.manage_assets permission only be reserved to trusted administrators and developers in general.

Patches

Sanitization of SVG assets is now applied automatically when uploading through the CMS Asset Manager.

This security issue has been fixed as of https://github.com/wintercms/winter/commit/8a7f74b004fcd19721764fc63af0cdb339d9fb65.

Workarounds

If users cannot upgrade, they may apply commit https://github.com/wintercms/winter/commit/8a7f74b004fcd19721764fc63af0cdb339d9fb65 to their Winter CMS installation manually to resolve this issue.

Show details on source website

{
  "affected": [
    {
      "database_specific": {
        "last_known_affected_version_range": "\u003c= 1.2.9"
      },
      "package": {
        "ecosystem": "Packagist",
        "name": "winter/wn-cms-module"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "1.2.10"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "aliases": [
    "CVE-2026-22254"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-79"
    ],
    "github_reviewed": true,
    "github_reviewed_at": "2026-02-04T21:32:39Z",
    "nvd_published_at": "2026-02-06T20:16:10Z",
    "severity": "LOW"
  },
  "details": "## Impact\nAffected versions of Winter CMS allow users with access to the CMS Asset Manager were able to upload SVGs without automatic sanitization.\n\nTo actively exploit this security issue, an attacker would need access to the Backend with a user account with the following permission: `cms.manage_assets`\n\nThe Winter CMS maintainers strongly recommend that the `cms.manage_assets` permission only be reserved to trusted administrators and developers in general.\n\n## Patches\nSanitization of SVG assets is now applied automatically when uploading through the CMS Asset Manager.\n\nThis security issue has been fixed as of https://github.com/wintercms/winter/commit/8a7f74b004fcd19721764fc63af0cdb339d9fb65.\n\n## Workarounds\nIf users cannot upgrade, they may apply commit https://github.com/wintercms/winter/commit/8a7f74b004fcd19721764fc63af0cdb339d9fb65 to their Winter CMS installation manually to resolve this issue.",
  "id": "GHSA-m7gw-rffq-rxjm",
  "modified": "2026-02-06T21:42:09Z",
  "published": "2026-02-04T21:32:39Z",
  "references": [
    {
      "type": "WEB",
      "url": "https://github.com/wintercms/winter/security/advisories/GHSA-m7gw-rffq-rxjm"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22254"
    },
    {
      "type": "WEB",
      "url": "https://github.com/wintercms/winter/commit/8a7f74b004fcd19721764fc63af0cdb339d9fb65"
    },
    {
      "type": "PACKAGE",
      "url": "https://github.com/wintercms/winter"
    },
    {
      "type": "WEB",
      "url": "https://github.com/wintercms/winter/releases/tag/v1.2.10"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:N",
      "type": "CVSS_V3"
    }
  ],
  "summary": "Winter CMS has Stored Cross-site Scripting (XSS) in Asset Manager"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…