Published Date: December 21, 2024
Package | Affected Versions | Patched Versions | Severity |
---|---|---|---|
📦 Piranha (NuGet) | <= 11.1.0 | Moderate |
Description
Vulnerability Details
A stored cross-site scripting (XSS) vulnerability exists in Piranha CMS version 11.1 and earlier. Attackers can inject and execute malicious JavaScript in a user’s browser.
How It Happens:
- An attacker creates a new page via
/manager/pages
. - They add markdown content containing an XSS payload.
- When an admin or user views the content, the script executes in their browser.
Patches & Workarounds
Potential Fix or Mitigation:
- Sanitize User Input: Ensure all markdown content is properly sanitized before rendering.
- Content Security Policy (CSP): Implement a strict CSP to prevent the execution of injected scripts.
- Update Regularly: Monitor updates from the Piranha CMS team for an official patch.
- Restrict Permissions: Limit access to
/manager/pages
for untrusted users.