logo

CVE-2020-25626 djangorestframework

Package

Manager: pip
Name: djangorestframework
Vulnerable Version: >=0 <3.11.2

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N

EPSS: 0.00842 pctl0.73886

Details

Cross-site Scripting (XSS) in Django REST Framework A flaw was found in Django REST Framework versions before 3.12.0 and before 3.11.2. When using the browseable API viewer, Django REST Framework fails to properly escape certain strings that can come from user input. This allows a user who can control those strings to inject malicious <script> tags, leading to a cross-site-scripting (XSS) vulnerability.

Metadata

Created: 2021-03-19T21:32:47Z
Modified: 2024-09-20T14:56:47Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/03/GHSA-fx83-3ph3-9j2q/GHSA-fx83-3ph3-9j2q.json
CWE IDs: ["CWE-20", "CWE-79"]
Alternative ID: GHSA-fx83-3ph3-9j2q
Finding: F425
Auto approve: 1