Lucene search

K
cve[email protected]CVE-2023-28836
HistoryApr 03, 2023 - 5:15 p.m.

CVE-2023-28836

2023-04-0317:15:06
CWE-79
web.nvd.nist.gov
21
wagtail
cms
django
cve-2023-28836
xss
vulnerability
security
patch

6.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H

5.3 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

41.1%

Wagtail is an open source content management system built on Django. Starting in version 1.5 and prior to versions 4.1.4 and 4.2.2, a stored cross-site scripting (XSS) vulnerability exists on ModelAdmin views within the Wagtail admin interface. A user with a limited-permission editor account for the Wagtail admin could potentially craft pages and documents that, when viewed by a user with higher privileges, could perform actions with that user’s credentials. The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin, and only affects sites with ModelAdmin enabled. For page, the vulnerability is in the “Choose a parent page” ModelAdmin view (ChooseParentView), available when managing pages via ModelAdmin. For documents, the vulnerability is in the ModelAdmin Inspect view (InspectView) when displaying document fields. Patched versions have been released as Wagtail 4.1.4 and Wagtail 4.2.2. Site owners who are unable to upgrade to the new versions can disable or override the corresponding functionality.

Affected configurations

Vulners
NVD
Node
wagtailwagtailRange<1.5*
OR
wagtailwagtailRange<4.1.1
OR
wagtailwagtailRange<4.2*
OR
wagtailwagtailRange<4.2.2

CNA Affected

[
  {
    "vendor": "wagtail",
    "product": "wagtail",
    "versions": [
      {
        "version": "1.5",
        "status": "affected",
        "lessThan": "1.5*",
        "versionType": "custom"
      },
      {
        "version": "4.1.1",
        "status": "affected",
        "lessThan": "4.1.1",
        "versionType": "custom"
      },
      {
        "version": "4.2",
        "status": "affected",
        "lessThan": "4.2*",
        "versionType": "custom"
      },
      {
        "version": "4.2.2",
        "status": "affected",
        "lessThan": "4.2.2",
        "versionType": "custom"
      }
    ]
  }
]

6.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H

5.3 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

41.1%