logo

CVE-2021-25986 wiki

Package

Manager: pip
Name: wiki
Vulnerable Version: >=0.0.20 <0.7.9

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N

EPSS: 0.00195 pctl0.41573

Details

Cross-site Scripting in django-wiki In Django-wiki, versions 0.0.20 to 0.7.8 are vulnerable to Stored Cross-Site Scripting (XSS) in Notifications Section. An attacker who has access to edit pages can inject JavaScript payload in the title field. When a victim gets a notification regarding the changes made in the application, the payload in the notification panel renders and loads external JavaScript.

Metadata

Created: 2021-12-02T17:49:40Z
Modified: 2024-11-19T18:27:32Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/12/GHSA-3m3h-v9hv-9j4h/GHSA-3m3h-v9hv-9j4h.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-3m3h-v9hv-9j4h
Finding: F425
Auto approve: 1