CVE-2025-65012
PHP Análisis y mitigación de vulnerabilidades

Vista general

CVE-2025-65012 affects Kirby, an open-source content management system, in versions 5.0.0 to 5.1.3. The vulnerability is a Cross-site Scripting (XSS) issue in the changes dialog that allows attackers to inject malicious code through page titles or usernames. This vulnerability was discovered and disclosed on November 18, 2025, and affects all Kirby 5 sites where potential attackers have authenticated Panel user access or where external visitors can update page titles or usernames (GitHub Advisory).

Técnicas

The vulnerability is classified as a moderate severity issue with a CVSS v4.0 base score of 5.1. The attack vector is Network-based (AV:N) with Low attack complexity (AC:L), requiring Low privileges (PR:L) and Passive user interaction (UI:P). The vulnerability is categorized as CWE-79: Improper Neutralization of Input During Web Page Generation. The technical exploit involves attackers modifying a page title or username with malicious content, then modifying any content field without saving to make the model appear in the 'Changes' dialog (GitHub Advisory).

Impacto

When successfully exploited, the vulnerability allows execution of arbitrary JavaScript code inside the Panel session of users. Malicious scripts can trigger requests to Kirby's API with the victim's permissions. This is particularly critical in environments with multiple authenticated Panel users, as attackers could potentially escalate their privileges if they gain access to an admin user's Panel session (GitHub Advisory).

Mitigación y soluciones alternativas

The vulnerability has been patched in Kirby version 5.1.4. The fix includes adding required escaping code to ensure the browser displays plain text instead of executing code where model titles are rendered. Users are advised to update to version 5.1.4 or later to address this security issue (GitHub Release).

Recursos adicionales


FuenteEste informe se generó utilizando IA

Relacionado PHP Vulnerabilidades:

CVE ID

Severidad

Puntuación

Tecnologías

Nombre del componente

Exploit de CISA KEV

Tiene arreglo

Fecha de publicación

CVE-2025-65103HIGH8.8
  • PHPPHP
  • devcode-it/openstamanager
NoNov 19, 2025
CVE-2025-65013MEDIUM6.2
  • PHPPHP
  • librenms/librenms
NoNov 18, 2025
CVE-2025-65093MEDIUM5.5
  • PHPPHP
  • librenms/librenms
NoNoNov 18, 2025
CVE-2025-65012MEDIUM5.1
  • PHPPHP
  • getkirby/cms
NoNov 18, 2025
CVE-2025-65014LOW3.7
  • PHPPHP
  • librenms/librenms
NoNov 18, 2025

Evaluación gratuita de vulnerabilidades

Compare su postura de seguridad en la nube

Evalúe sus prácticas de seguridad en la nube en 9 dominios de seguridad para comparar su nivel de riesgo e identificar brechas en sus defensas.

Solicitar evaluación

Recursos adicionales de Wiz

Obtén una demostración personalizada

¿Listo para ver a Wiz en acción?

"La mejor experiencia de usuario que he visto en mi vida, proporciona una visibilidad completa de las cargas de trabajo en la nube."
David EstlickCISO
"Wiz proporciona un panel único para ver lo que ocurre en nuestros entornos en la nube."
Adam FletcherJefe de Seguridad
"Sabemos que si Wiz identifica algo como crítico, en realidad lo es."
Greg PoniatowskiJefe de Gestión de Amenazas y Vulnerabilidades