CVE-2025-65012

Kirby is an open-source content management system. From versions 5.0.0 to 5.1.3, attackers could change the title of any page or the name of any user to a malicious string. Then they could modify any content field of the same model without saving, making the model a candidate for display in the "Changes" dialog. If another authenticated user subsequently opened the dialog in their Panel, the malicious code would be executed. This vulnerability affects all Kirby 5 sites that might have potential attackers in the group of authenticated Panel users or that allow external visitors to update page titles or usernames. The attack requires user interaction by another Panel user and cannot be automated. This issue has been patched in version 5.1.4.
Configurations

Configuration 1 (hide)

cpe:2.3:a:getkirby:kirby:*:*:*:*:*:*:*:*

History

26 Nov 2025, 16:25

Type Values Removed Values Added
First Time Getkirby
Getkirby kirby
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.4
CPE cpe:2.3:a:getkirby:kirby:*:*:*:*:*:*:*:*
References () https://github.com/getkirby/kirby/releases/tag/5.1.4 - () https://github.com/getkirby/kirby/releases/tag/5.1.4 - Release Notes
References () https://github.com/getkirby/kirby/security/advisories/GHSA-84hf-8gh5-575j - () https://github.com/getkirby/kirby/security/advisories/GHSA-84hf-8gh5-575j - Patch, Vendor Advisory

18 Nov 2025, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-18 23:15

Updated : 2025-11-26 16:25


NVD link : CVE-2025-65012

Mitre link : CVE-2025-65012

CVE.ORG link : CVE-2025-65012


JSON object : View

Products Affected

getkirby

  • kirby
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')