CVE-2023-28836

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-28836
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-28836.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-28836
Aliases
Published
2023-04-03T17:15:06Z
Modified
2024-05-30T04:03:21.799716Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

Wagtail is an open source content management system built on Django. Starting in version 1.5 and prior to versions 4.1.4 and 4.2.2, a stored cross-site scripting (XSS) vulnerability exists on ModelAdmin views within the Wagtail admin interface. A user with a limited-permission editor account for the Wagtail admin could potentially craft pages and documents that, when viewed by a user with higher privileges, could perform actions with that user's credentials. The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin, and only affects sites with ModelAdmin enabled. For page, the vulnerability is in the "Choose a parent page" ModelAdmin view (ChooseParentView), available when managing pages via ModelAdmin. For documents, the vulnerability is in the ModelAdmin Inspect view (InspectView) when displaying document fields. Patched versions have been released as Wagtail 4.1.4 and Wagtail 4.2.2. Site owners who are unable to upgrade to the new versions can disable or override the corresponding functionality.

References

Affected packages

Git / github.com/wagtail/wagtail

Affected ranges

Type
GIT
Repo
https://github.com/wagtail/wagtail
Events

Affected versions

Other

after-modeladmin-fix
caltech-upgrade-point-1

v0.*

v0.1
v0.2
v0.3
v0.3.1
v0.4
v0.5
v0.6
v0.7
v0.8
v0.8.1

v1.*

v1.0b1
v1.0b2
v1.0rc1
v1.10rc1
v1.1rc1
v1.2rc1
v1.3rc1
v1.4rc1
v1.5rc1
v1.6rc1
v1.8rc1

v2.*

v2.0b1
v2.11.rc1
v2.16rc1
v2.1rc1
v2.2rc1
v2.8rc1

v4.*

v4.1rc1
v4.2
v4.2.1
v4.2rc1