In Django-wiki, versions 0.0.20 to 0.7.8 are vulnerable to Stored Cross-Site Scripting (XSS) in Notifications Section. An attacker who has access to edit pages can inject JavaScript payload in the title field. When a victim gets a notification regarding the changes made in the application, the payload in the notification panel renders and loads external JavaScript.
References
Link | Resource |
---|---|
https://github.com/django-wiki/django-wiki/commit/9eaccc7519e4206a4d2f22640882f0737b2da9c5 | Patch Third Party Advisory |
https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25986 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2021-11-23 20:15
Updated : 2024-02-28 18:48
NVD link : CVE-2021-25986
Mitre link : CVE-2021-25986
CVE.ORG link : CVE-2021-25986
JSON object : View
Products Affected
django-wiki_project
- django-wiki
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')