Lucene search

K
cvelistGitHub_MCVELIST:CVE-2020-4052
HistoryJun 16, 2020 - 9:55 p.m.

CVE-2020-4052 Stored XSS through template injection in Wiki.js

2020-06-1621:55:15
CWE-79
GitHub_M
www.cve.org
2

CVSS3

6.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L

AI Score

6.1

Confidence

High

EPSS

0.001

Percentile

29.3%

In Wiki.js before 2.4.107, there is a stored cross-site scripting through template injection. This vulnerability exists due to an insecure validation mechanism intended to insert v-pre tags into rendered HTML elements which contain curly-braces. By creating a crafted wiki page, a malicious Wiki.js user may stage a stored cross-site scripting attack. This allows the attacker to execute malicious JavaScript when the page is viewed by other users. This has been patched in 2.4.107.

CNA Affected

[
  {
    "product": "Wiki.js",
    "vendor": "Requarks.io",
    "versions": [
      {
        "status": "affected",
        "version": "< 2.4.107"
      }
    ]
  }
]

CVSS3

6.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L

AI Score

6.1

Confidence

High

EPSS

0.001

Percentile

29.3%

Related for CVELIST:CVE-2020-4052