Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. getkirby/cms
  4. ›
  5. CVE-2024-41964

CVE-2024-41964: Kirby has insufficient permission checks in the language settings

August 29, 2024

The missing permission checks allowed attackers with Panel access to manipulate the language definitions.

The language definitions are at the core of multi-language content in Kirby. Unauthorized modifications with malicious intent can cause significant damage, for example:

  • If the languages option was enabled but no language exists, creating the first language will switch Kirby to multi-language mode.
  • Deleting an existing language will lead to content loss of all translated content in that language. Deleting the last language will switch Kirby to single-language mode.
  • Updating a language allows to change the metadata including the language slug (used in page URLs) and language variables. It also allows to change the default language, which will cause Kirby to use the new default language’s content as a fallback for non-existing translations.

Depending on the site code, the result of such actions can cause loss of site availability (e.g. error messages in the site frontend) or integrity (due to changed URLs or removed translations).

References

  • github.com/advisories/GHSA-jm9m-rqr3-wfmh
  • github.com/getkirby/kirby
  • github.com/getkirby/kirby/commit/1dbc9215c97a5c22dc7f34a4e3a64d19e1eac151
  • github.com/getkirby/kirby/commit/38636655b054e820f66c3b717c55a9d60fe6400a
  • github.com/getkirby/kirby/commit/83fce501759782cf843b6f1d9293a7c7167e69af
  • github.com/getkirby/kirby/commit/ab95d172667c3cd529917c2bc94d3c7969706d23
  • github.com/getkirby/kirby/commit/af9b0a58dea63effab85525ae217faa1f5ded423
  • github.com/getkirby/kirby/commit/e647a177c75636ef4824662b2ce00d8e5c3a8406
  • github.com/getkirby/kirby/releases/tag/3.10.1.1
  • github.com/getkirby/kirby/releases/tag/3.6.6.6
  • github.com/getkirby/kirby/releases/tag/3.7.5.5
  • github.com/getkirby/kirby/releases/tag/3.8.4.4
  • github.com/getkirby/kirby/releases/tag/3.9.8.2
  • github.com/getkirby/kirby/releases/tag/4.3.1
  • github.com/getkirby/kirby/security/advisories/GHSA-jm9m-rqr3-wfmh
  • nvd.nist.gov/vuln/detail/CVE-2024-41964

Code Behaviors & Features

Detect and mitigate CVE-2024-41964 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 3.6.6.6, all versions starting from 3.7.0 before 3.7.5.5, all versions starting from 3.8.0 before 3.8.4.4, all versions starting from 3.9.0 before 3.9.8.2, all versions starting from 3.10.0 before 3.10.1.1, all versions starting from 4.0.0 before 4.3.1

Fixed versions

  • 3.6.6.6
  • 3.7.5.5
  • 3.8.4.4
  • 3.9.8.2
  • 3.10.1.1
  • 4.3.1

Solution

Upgrade to versions 3.10.1.1, 3.6.6.6, 3.7.5.5, 3.8.4.4, 3.9.8.2, 4.3.1 or above.

Impact 8.1 HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-863: Incorrect Authorization

Source file

packagist/getkirby/cms/CVE-2024-41964.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:47 +0000.