CVE-2020-4052

In Wiki.js before 2.4.107, there is a stored cross-site scripting through template injection. This vulnerability exists due to an insecure validation mechanism intended to insert v-pre tags into rendered HTML elements which contain curly-braces. By creating a crafted wiki page, a malicious Wiki.js user may stage a stored cross-site scripting attack. This allows the attacker to execute malicious JavaScript when the page is viewed by other users. This has been patched in 2.4.107.
Configurations

Configuration 1 (hide)

cpe:2.3:a:requarks:wiki.js:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:32

Type Values Removed Values Added
References () https://github.com/Requarks/wiki/commit/9e08718ee904046f8b2294ef6ac79e8a75a451e3 - Patch, Third Party Advisory () https://github.com/Requarks/wiki/commit/9e08718ee904046f8b2294ef6ac79e8a75a451e3 - Patch, Third Party Advisory
References () https://github.com/Requarks/wiki/security/advisories/GHSA-9jgg-4xj2-vjjj - Third Party Advisory () https://github.com/Requarks/wiki/security/advisories/GHSA-9jgg-4xj2-vjjj - Third Party Advisory
CVSS v2 : 4.3
v3 : 6.1
v2 : 4.3
v3 : 6.3

Information

Published : 2020-06-16 22:15

Updated : 2024-11-21 05:32


NVD link : CVE-2020-4052

Mitre link : CVE-2020-4052

CVE.ORG link : CVE-2020-4052


JSON object : View

Products Affected

requarks

  • wiki.js
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')