CVE-2021-44649

Django CMS 3.7.3 does not validate the plugin_type parameter while generating error messages for an invalid plugin type, resulting in a Cross Site Scripting (XSS) vulnerability. The vulnerability allows an attacker to execute arbitrary JavaScript code in the web browser of the affected user.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:django-cms:django_cms:*:*:*:*:*:*:*:*
cpe:2.3:a:django-cms:django_cms:*:*:*:*:*:*:*:*
cpe:2.3:a:django-cms:django_cms:*:*:*:*:*:*:*:*
cpe:2.3:a:django-cms:django_cms:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:31

Type Values Removed Values Added
References () https://sahildhar.github.io/blogpost/Django-CMS-Reflected-XSS-Vulnerability/ - Exploit, Third Party Advisory () https://sahildhar.github.io/blogpost/Django-CMS-Reflected-XSS-Vulnerability/ - Exploit, Third Party Advisory
References () https://www.django-cms.org/en/blog/2020/07/22/django-cms-security-updates-1/ - Vendor Advisory () https://www.django-cms.org/en/blog/2020/07/22/django-cms-security-updates-1/ - Vendor Advisory

Information

Published : 2022-01-12 13:15

Updated : 2024-11-21 06:31


NVD link : CVE-2021-44649

Mitre link : CVE-2021-44649

CVE.ORG link : CVE-2021-44649


JSON object : View

Products Affected

django-cms

  • django_cms
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')