Lucene search

K
cvelistGitHub_MCVELIST:CVE-2020-11051
HistoryMay 05, 2020 - 8:45 p.m.

CVE-2020-11051 XSS in Wiki.js

2020-05-0520:45:12
CWE-79
GitHub_M
www.cve.org
6

CVSS3

6.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:N

AI Score

6.4

Confidence

High

EPSS

0.001

Percentile

19.4%

In Wiki.js before 2.3.81, there is a stored XSS in the Markdown editor. An editor with write access to a page, using the Markdown editor, could inject an XSS payload into the content. If another editor (with write access as well) load the same page into the Markdown editor, the XSS payload will be executed as part of the preview panel. The rendered result does not contain the XSS payload as it is stripped by the HTML Sanitization security module. This vulnerability only impacts editors loading the malicious page in the Markdown editor. This has been patched in 2.3.81.

CNA Affected

[
  {
    "product": "Wiki.js",
    "vendor": "Requarks",
    "versions": [
      {
        "status": "affected",
        "version": "< 2.3.81"
      }
    ]
  }
]

CVSS3

6.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:N

AI Score

6.4

Confidence

High

EPSS

0.001

Percentile

19.4%

Related for CVELIST:CVE-2020-11051