Releases: getkirby/kirby
3.6.6.4
🎉 Features
The Content-Security-Policy: frame-ancestors
header sent by the Panel (introduced in 3.6.6.3) can now be customized with an option if needed:
return [
'panel' => [
// allow frame embedding from the same domain
'frameAncestors' => true,
// allow frame embedding from the same *and* from the specified domains
'frameAncestors' => ['*.example.com', 'https://example.com'],
// allow frame embedding on any domain (not recommended)
'frameAncestors' => '*',
]
];
3.5.8.4
🎉 Features
The Content-Security-Policy: frame-ancestors
header sent by the Panel (introduced in 3.5.8.3) can now be customized with an option if needed:
return [
'panel' => [
// allow frame embedding from the same domain
'frameAncestors' => true,
// allow frame embedding from the same *and* from the specified domains
'frameAncestors' => ['*.example.com', 'https://example.com'],
// allow frame embedding on any domain (not recommended)
'frameAncestors' => '*',
]
];
4.0.0-alpha.6
🎉 Features
- Writer: blockquote
quote
node (by default not included in nodes dropdown) - New
languages.variables
config option to disable managing translations in the Panel
✨ Enhancements
- Support any character in language variable keys
- Layouts selector customizable
size
(small, medium, large, huge) andcolumns
via newselector
proplayout: type: layout layouts: ... selector: # `small`, `medium`, `large` or `huge` size: huge columns: 6
🐛 Bug fixes
- Page create dialog: allow custom status for anyone #5365
- Fix selected link in link dialog #5198
- Panel menu: gaps between button groups are correct again #5383
- Language editor doesn't support keys with spaces #5332
- Layout selector broken columns #5382
- Fix structure field validation #5390
- Fix centered card icon in Safari #5409
- Longer help text no longer ignores margin to pages section #5406
- Fix toggle field preview #5426
- Fixed jumping checkbox in Firefox #5420
- Fixed descenders in headers #5415
- Fixed prop type check in choice component #5392
- Fixed textarea toolbar overflow #5254
- Fixed nested structures #5385
- Fixed nested object fields #5427
- Fixed reactive props in drawers #5411
- Fixed label association with inputs
- Icon in page picker is no longer squished when title is long #5416
- Bring back lock states #5389
- Fixed slug rules #5423
- Fix cardlets layout in Safari #5391
- Fix scroll bar issues in drawers and dialogs #5393
🚨 Security
This pre-release comes with the security fixes from 3.9.6 and the patch from 3.9.6.1:
- https://github.com/getkirby/kirby/releases/tag/3.9.6
- https://github.com/getkirby/kirby/releases/tag/3.9.6.1
🚨 Breaking changes
twitter
KirbyTag and Helper have been removed. Use legacy plugin if you still rely on these: legacy-twitter.zip
3.9.6.1
🎉 Features
-
The
Content-Security-Policy: frame-ancestors
header sent by the Panel (introduced in 3.9.6) can now be customized with an option if needed: #5431return [ 'panel' => [ // allow frame embedding from the same domain 'frameAncestors' => true, // allow frame embedding from the same *and* from the specified domains 'frameAncestors' => ['*.example.com', 'https://example.com'], // allow frame embedding on any domain (not recommended) 'frameAncestors' => '*', ] ];
🐛 Bug fixes
- Search component broken when query is
null
#5428
3.9.6
🚨 Security release
This release fixes several vulnerabilities that were all responsibly reported to us in June 2023:
- Insufficient Session Expiration after a password change (high severity, CVSS score 7.3)
- Field injection in the KirbyData text storage handler (high severity, CVSS score 7.1)
- XML External Entity (XXE) vulnerability in the XML data handler (medium severity, CVSS score 6.8)
- Cross-site scripting (XSS) from MIME type auto-detection of uploaded files (medium severity, CVSS score 5.7)
- Denial of service from unlimited password lengths (medium severity, CVSS score 5.3)
Thanks to Shankar Acharya (@5hank4r), Alexandre Zanni (@noraj) at ACCEIS and Patrick Falb (@dapatrese) at FORMER 03 for responsibly reporting the identified issues.
Updated default .htaccess
We have updated the .htaccess
that ships with our kits to the new version 2023-07-22
, which adds protection against browser MIME type detection from malicious file uploads for files that have already been copied to the media
folder. We recommend to update your sites’ .htaccess
or server configuration with the new changes if you might have potential attackers in your group of authenticated Panel users or if your sites allow file uploads by visitors and the file extensions of uploaded files are not limited to a fixed safe list.
You can find the changes to the .htaccess
in this commit and read more about the added rules in the security guide.
Thanks to Shankar Acharya (@5hank4r) for making us aware of this potential attack vector.
Frame-blocking in the Panel
The Panel now sends the Content-Security-Policy: frame-ancestors 'none'
header to increase the protection against clickjacking attacks. The session cookie was already set to SameSite
before, so this is an additional layer of protection.
Thanks to Shankar Acharya (@5hank4r) for suggesting this security enhancement.
Security-related breaking changes
- All users are logged out from their sessions after updating to this patch release.
- The
Xml
data handler (e.g.Data::decode($string, 'xml')
) and theXml::parse()
method no longer process XML external entities. - The Panel can no longer be embedded in HTML frames.
🎉 Features
- Added Rumanian translation (thanks to @danburzo) 🎉
✨ Enhancements
- Updated translations (is, ko, pl, sv)
- Stats section:
link
,label
,info
andvalue
now all support translations and Kirby queries #5256 - Support for variadic controller arguments (thanks to @lukaskleinschmidt) #5222
collection()
helper (and corresponding methods) allow passing an$options
array which will be provided as additional arguments to the collection closure (thanks to @ceesvanegmond)<?php // site/controller/news.php $articles = collection('news', ['order' => 'asc']); // site/collection/news.php use Kirby\Cms\Site; return function (Site $site, string $order) { return $site->find('news')->children()->template('article')->orderBy($order); };
🐛 Bug fixes
- Fixed
lock
API routes for files that are ancestors of a page calledfiles
#5273 - Kirby queries can handle integers and floats as arguments correctly now
- Fixed using Query helpers, such as
page()
alongside provided objects with the same name #5276 - Structure form options button doesn't disappear anymore when form is open but disabled #5302
- Fixed Panel URL redirect issue when running on subfolder #5266
- Fixed number field blur issue #5170
- Fixed language detection with custom locale #5320
- Fixed user blueprint home option #5359 (regression)
- Fixed full preview slug in change URL dialog when in multi-language mode #5371
- Fixed correct slug rules usage for Romanian (thanks to @danburzo) #5376
♻️ Refactored
- Clean up
search
component #5297
3.8.4.1
🚨 Security release
This release fixes several vulnerabilities that were all responsibly reported to us in June 2023:
- Insufficient Session Expiration after a password change (high severity, CVSS score 7.3)
- Field injection in the KirbyData text storage handler (high severity, CVSS score 7.1)
- XML External Entity (XXE) vulnerability in the XML data handler (medium severity, CVSS score 6.8)
- Cross-site scripting (XSS) from MIME type auto-detection of uploaded files (medium severity, CVSS score 5.7)
- Denial of service from unlimited password lengths (medium severity, CVSS score 5.3)
Thanks to Shankar Acharya (@5hank4r), Alexandre Zanni (@noraj) at ACCEIS and Patrick Falb (@dapatrese) at FORMER 03 for responsibly reporting the identified issues.
Updated default .htaccess
We have updated the .htaccess
that ships with our kits to the new version 2023-07-22
, which adds protection against browser MIME type detection from malicious file uploads for files that have already been copied to the media
folder. We recommend to update your sites’ .htaccess
or server configuration with the new changes if you might have potential attackers in your group of authenticated Panel users or if your sites allow file uploads by visitors and the file extensions of uploaded files are not limited to a fixed safe list.
You can find the changes to the .htaccess
in this commit and read more about the added rules in the security guide.
Thanks to Shankar Acharya (@5hank4r) for making us aware of this potential attack vector.
Frame-blocking in the Panel
The Panel now sends the Content-Security-Policy: frame-ancestors 'none'
header to increase the protection against clickjacking attacks. The session cookie was already set to SameSite
before, so this is an additional layer of protection.
Thanks to Shankar Acharya (@5hank4r) for suggesting this security enhancement.
Security-related breaking changes
- All users are logged out from their sessions after updating to this patch release.
- The
Xml
data handler (e.g.Data::decode($string, 'xml')
) and theXml::parse()
method no longer process XML external entities. - The Panel can no longer be embedded in HTML frames.
3.7.5.2
🚨 Security release
This release fixes several vulnerabilities that were all responsibly reported to us in June 2023:
- Insufficient Session Expiration after a password change (high severity, CVSS score 7.3)
- Field injection in the KirbyData text storage handler (high severity, CVSS score 7.1)
- XML External Entity (XXE) vulnerability in the XML data handler (medium severity, CVSS score 6.8)
- Cross-site scripting (XSS) from MIME type auto-detection of uploaded files (medium severity, CVSS score 5.7)
- Denial of service from unlimited password lengths (medium severity, CVSS score 5.3)
Thanks to Shankar Acharya (@5hank4r), Alexandre Zanni (@noraj) at ACCEIS and Patrick Falb (@dapatrese) at FORMER 03 for responsibly reporting the identified issues.
Updated default .htaccess
We have updated the .htaccess
that ships with our kits to the new version 2023-07-22
, which adds protection against browser MIME type detection from malicious file uploads for files that have already been copied to the media
folder. We recommend to update your sites’ .htaccess
or server configuration with the new changes if you might have potential attackers in your group of authenticated Panel users or if your sites allow file uploads by visitors and the file extensions of uploaded files are not limited to a fixed safe list.
You can find the changes to the .htaccess
in this commit and read more about the added rules in the security guide.
Thanks to Shankar Acharya (@5hank4r) for making us aware of this potential attack vector.
Frame-blocking in the Panel
The Panel now sends the Content-Security-Policy: frame-ancestors 'none'
header to increase the protection against clickjacking attacks. The session cookie was already set to SameSite
before, so this is an additional layer of protection.
Thanks to Shankar Acharya (@5hank4r) for suggesting this security enhancement.
Security-related breaking changes
- All users are logged out from their sessions after updating to this patch release.
- The
Xml
data handler (e.g.Data::decode($string, 'xml')
) and theXml::parse()
method no longer process XML external entities. - The Panel can no longer be embedded in HTML frames.
3.6.6.3
🚨 Security release
This release fixes several vulnerabilities that were all responsibly reported to us in June 2023:
- Insufficient Session Expiration after a password change (high severity, CVSS score 7.3)
- Field injection in the KirbyData text storage handler (high severity, CVSS score 7.1)
- XML External Entity (XXE) vulnerability in the XML data handler (medium severity, CVSS score 6.8)
- Cross-site scripting (XSS) from MIME type auto-detection of uploaded files (medium severity, CVSS score 5.7)
- Denial of service from unlimited password lengths (medium severity, CVSS score 5.3)
Thanks to Shankar Acharya (@5hank4r), Alexandre Zanni (@noraj) at ACCEIS and Patrick Falb (@dapatrese) at FORMER 03 for responsibly reporting the identified issues.
Updated default .htaccess
We have updated the .htaccess
that ships with our kits to the new version 2023-07-22
, which adds protection against browser MIME type detection from malicious file uploads for files that have already been copied to the media
folder. We recommend to update your sites’ .htaccess
or server configuration with the new changes if you might have potential attackers in your group of authenticated Panel users or if your sites allow file uploads by visitors and the file extensions of uploaded files are not limited to a fixed safe list.
You can find the changes to the .htaccess
in this commit and read more about the added rules in the security guide.
Thanks to Shankar Acharya (@5hank4r) for making us aware of this potential attack vector.
Frame-blocking in the Panel
The Panel now sends the Content-Security-Policy: frame-ancestors 'none'
header to increase the protection against clickjacking attacks. The session cookie was already set to SameSite
before, so this is an additional layer of protection.
Thanks to Shankar Acharya (@5hank4r) for suggesting this security enhancement.
Security-related breaking changes
- All users are logged out from their sessions after updating to this patch release.
- The
Xml
data handler (e.g.Data::decode($string, 'xml')
) and theXml::parse()
method no longer process XML external entities. - The Panel can no longer be embedded in HTML frames.
3.5.8.3
🚨 Security release
This release fixes several vulnerabilities that were all responsibly reported to us in June 2023:
- Insufficient Session Expiration after a password change (high severity, CVSS score 7.3)
- Field injection in the KirbyData text storage handler (high severity, CVSS score 7.1)
- XML External Entity (XXE) vulnerability in the XML data handler (medium severity, CVSS score 6.8)
- Cross-site scripting (XSS) from MIME type auto-detection of uploaded files (medium severity, CVSS score 5.7)
- Denial of service from unlimited password lengths (medium severity, CVSS score 5.3)
Thanks to Shankar Acharya (@5hank4r), Alexandre Zanni (@noraj) at ACCEIS and Patrick Falb (@dapatrese) at FORMER 03 for responsibly reporting the identified issues.
Updated default .htaccess
We have updated the .htaccess
that ships with our kits to the new version 2023-07-22
, which adds protection against browser MIME type detection from malicious file uploads for files that have already been copied to the media
folder. We recommend to update your sites’ .htaccess
or server configuration with the new changes if you might have potential attackers in your group of authenticated Panel users or if your sites allow file uploads by visitors and the file extensions of uploaded files are not limited to a fixed safe list.
You can find the changes to the .htaccess
in this commit and read more about the added rules in the security guide.
Thanks to Shankar Acharya (@5hank4r) for making us aware of this potential attack vector.
Frame-blocking in the Panel
The Panel now sends the Content-Security-Policy: frame-ancestors 'none'
header to increase the protection against clickjacking attacks. The session cookie was already set to SameSite
before, so this is an additional layer of protection.
Thanks to Shankar Acharya (@5hank4r) for suggesting this security enhancement.
Security-related breaking changes
- All users are logged out from their sessions after updating to this patch release.
- The
Xml
data handler (e.g.Data::decode($string, 'xml')
) and theXml::parse()
method no longer process XML external entities. - The Panel can no longer be embedded in HTML frames.
4.0.0-alpha.5
🚀 Kirby 4 roadmap
This is a pre-release for Kirby 4, which will be released later this year. Find out more about features and our roadmap on our Kirby 4 release page: https://getkirby.com/releases/4.0
🎉 Features
New Panel Design
Highlights
- New collapsible sidebar menu
- Full width layout
- New color scheme
- New save button position
- New button styles
- New system for CSS properties
- Completely overhauled keyboard accessibility
- Improved scroll behaviour
- Lots of improvements to responsiveness (due to container queries)
- Many new opportunities to style components via custom CSS properties
Core
- New
access
andlist
permissions for files #5219
✨ Enhancements
- Disabled buttons can receive focus (tab) which allows them to be read out by screenreaders
- Structure fields don’t disregard content changes anymore when clicking outside the form (now drawer)
🐛 Bug fixes
App::multilang
andApp::defaultLanguage
are correctly updated #5342- Prevent unnecessary runs in
Language::update
when updating the default language - Don’t display superfluous node divider on writer field #5352
- Fixed centering of picker dialogs #5321
- Fixed a lot of overflow layout issues related to too narrow columns
- Default languages an multilang is now correctly handled when changed during a request #5343
- Block title: certain HTML characters are now properly unescaped in the label #5346
- Fix
->toUrl()
method for invalid uuids #5367