๐Ÿ” CVE Alert

CVE-2026-24749

MEDIUM 5.3

Silverstripe Assets Module has a DBFile::getURL() permission bypass

CVSS Score
5.3
EPSS Score
0.0%
EPSS Percentile
8th

The Silverstripe Assets Module is a required component of Silverstripe Framework. In versions prior to 2.4.5 and 3.0.0-rc1 through 3.1.2, images rendered in templates or otherwise accessed via DBFile::getURL() or DBFile::getSourceURL() incorrectly add an access grant to the current session, which bypasses file permissions. This usually happens when creating an image variant, for example using a manipulation method like ScaleWidth() or Convert(). Note that if developers use DBFile directly in the $db configuration for a DataObject class that doesn't subclass File, and if they were setting the visibility of those files to "protected", those files will now need an explicit access grant to be accessed. If developers do not want to explicitly provide access grants for these files in their apps (i.e. they want these files to be accessible by default), they should use the "public" visibility. This issue has been fixed in versions 2.4.5 and 3.1.3.

CWE CWE-863
Vendor silverstripe
Product silverstripe-assets
Published Apr 16, 2026
Last Updated Apr 18, 2026
Stay Ahead of the Next One

Get instant alerts for silverstripe silverstripe-assets

Be the first to know when new medium vulnerabilities affecting silverstripe silverstripe-assets are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None

Affected Versions

silverstripe / silverstripe-assets
< 2.4.5 >= 3.0.0-rc1, < 3.1.3

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/silverstripe/silverstripe-assets/security/advisories/GHSA-jgcf-rf45-2f8v silverstripe.org: https://www.silverstripe.org/download/security-releases/cve-2026-24749