CVE-2020-11051

In Wiki.js before 2.3.81, there is a stored XSS in the Markdown editor. An editor with write access to a page, using the Markdown editor, could inject an XSS payload into the content. If another editor (with write access as well) load the same page into the Markdown editor, the XSS payload will be executed as part of the preview panel. The rendered result does not contain the XSS payload as it is stripped by the HTML Sanitization security module. This vulnerability only impacts editors loading the malicious page in the Markdown editor. This has been patched in 2.3.81.
Configurations

Configuration 1 (hide)

cpe:2.3:a:requarks:wiki.js:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:56

Type Values Removed Values Added
References () https://github.com/Requarks/wiki/commit/05e8a71ceff39167aee830ba8ad5eb0161f2911a - Patch, Third Party Advisory () https://github.com/Requarks/wiki/commit/05e8a71ceff39167aee830ba8ad5eb0161f2911a - Patch, Third Party Advisory
References () https://github.com/Requarks/wiki/security/advisories/GHSA-vj72-c9vq-qxrv - Patch, Third Party Advisory () https://github.com/Requarks/wiki/security/advisories/GHSA-vj72-c9vq-qxrv - Patch, Third Party Advisory
CVSS v2 : 3.5
v3 : 4.8
v2 : 3.5
v3 : 6.9

Information

Published : 2020-05-05 21:15

Updated : 2024-11-21 04:56


NVD link : CVE-2020-11051

Mitre link : CVE-2020-11051

CVE.ORG link : CVE-2020-11051


JSON object : View

Products Affected

requarks

  • wiki.js
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')