October CMS Vulnerable to Stored XSS via Editor and Branding Styles
Moderate severity
GitHub Reviewed
Published
Jan 9, 2026
in
octobercms/october
•
Updated Jan 11, 2026
Package
Affected versions
<= 3.7.12
>= 4.0.0, <= 4.0.11
Patched versions
3.7.13
4.0.12
Description
Published to the GitHub Advisory Database
Jan 9, 2026
Reviewed
Jan 9, 2026
Published by the National Vulnerability Database
Jan 10, 2026
Last updated
Jan 11, 2026
A cross-site scripting (XSS) vulnerabilities was identified in October CMS backend configuration forms:
A user with the
Global Editor Settingspermission could inject malicious HTML/JS into the stylesheet input atSettings → Editor Settings → Markup Styles.
A specially crafted input could break out of the intended
<style>context, allowing arbitrary script execution across backend pages for all users.Impact
Patches
The vulnerability has been patched in v4.0.12 and v3.7.13.
Stylesheet inputs are now sanitized to prevent injection of arbitrary HTML/JS.
All users are strongly encouraged to upgrade to the latest patched version.
Workarounds
If upgrading immediately is not possible:
Global Editor Settingsto fully trusted administrators only.This reduces exposure but does not fully eliminate risk.
Credits
References