Cross site scripting in Piranha CMS v12.0
A stored cross-site scripting (XSS) vulnerability in the /manager/pages component of Piranha CMS v12.0 allows attackers to execute arbitrary web scripts or HTML via creating a page and injecting a crafted payload into the Markdown blocks bypass of CVE CVE-2024-55341
About Responsible Disclosure
All vulnerabilities I discover are handled through a responsible and coordinated disclosure process. Before any public release, each finding is privately reported to the appropriate vendor, maintainer, or security team to allow sufficient time for verification and remediation. My goal is to ensure that vulnerabilities are addressed effectively and that users remain protected throughout the disclosure lifecycle. I work closely with development teams to validate fixes, provide technical details, and confirm resolution whenever possible. In cases where no fix is issued or the vendor remains unresponsive after multiple contact attempts, the disclosure proceeds in accordance with established coordinated disclosure timelines and ethical reporting standards. CVE identifiers are reserved and published prior to any public disclosure to maintain transparency and integrity in the reporting process. This approach reflects my belief that cybersecurity research should strengthen not disrupt the ecosystem, fostering trust, accountability, and resilience across the global security community.deployments.



Step-By-Step CVE Process
Step 1 — Stored Cross-Site Scripting (XSS) in Markdown Content Block of Piranha CMS 12.0
Piranha CMS v12.0 contains a stored cross-site scripting (XSS) bypass in the Markdown content block used within Standard Page and Standard Archive Page types. After the vendor added DOMPurify in v12.0 to address the earlier Markdown XSS (CVE-2024-55341.which affected v11.1), certain edge-case HTML/JS payloads remain unsanitized. An authenticated user can insert crafted JavaScript into a Markdown block; the payload is stored and executed during page preview and again when the page is published and viewed publicly. This represents a bypass of the prior remediation, expanding impact from editor-only execution to execution affecting preview and published pages and thus both authenticated and unauthenticated viewers.
CVE ID
CVE-2025-61413.
Vendor
https://piranhacms.org
GitHub: https://github.com/PiranhaCMS/piranha.core
Affected Product
Product: Piranha CMS
Version: 12.0
https://github.com/PiranhaCMS/piranha.core/releases/tag/v12.0
Affected Component(s) Markdown Content Block
Page Editor (/manager/pages)
Standard Page
Standard Archive Page