{"id":"CVE-2022-37429","details":"Silverstripe silverstripe/framework through 4.11 allows XSS (issue 1 of 2) via JavaScript payload to the href attribute of a link by splitting a javascript URL with white space characters.","aliases":["GHSA-wc6r-4ggc-79w5"],"modified":"2026-04-10T04:49:53.988882Z","published":"2022-11-23T02:15:09.717Z","references":[{"type":"ADVISORY","url":"https://www.silverstripe.org/download/security-releases/"},{"type":"ADVISORY","url":"https://www.silverstripe.org/download/security-releases/CVE-2022-37429"},{"type":"ADVISORY","url":"https://forum.silverstripe.org/c/releases"},{"type":"FIX","url":"https://www.silverstripe.org/blog/tag/release"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/silverstripe/silverstripe-framework","events":[{"introduced":"bfa436bb2a6f4534e82130dda38b625f25634578"},{"fixed":"20de819d2b0e8291353737e2ee110f178e9ef5fd"}],"database_specific":{"versions":[{"introduced":"3.0.0"},{"fixed":"4.11.13"}]}}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-37429.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"}]}