FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

py-wagtail -- stored XSS vulnerability

Affected packages
py310-wagtail < 4.1.4
4.2.0 <= py310-wagtail < 4.2.2
py311-wagtail < 4.1.4
4.2.0 <= py311-wagtail < 4.2.2
py37-wagtail < 4.1.4
4.2.0 <= py37-wagtail < 4.2.2
py38-wagtail < 4.1.4
4.2.0 <= py38-wagtail < 4.2.2
py39-wagtail < 4.1.4
4.2.0 <= py39-wagtail < 4.2.2

Details

VuXML ID 17efbe19-4e72-426a-8016-2b4e001c1378
Discovery 2023-04-03
Entry 2023-08-31

A stored cross-site scripting (XSS) vulnerability exists on ModelAdmin views within the Wagtail admin interface.

A user with a limited-permission editor account for the Wagtail admin could potentially craft pages and documents that, when viewed by a user with higher privileges, could perform actions with that user's credentials.

The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin, and only affects sites with ModelAdmin enabled.

For page, the vulnerability is in the "Choose a parent page" ModelAdmin view, available when managing pages via ModelAdmin.

For documents, the vulnerability is in the ModelAdmin Inspect view when displaying document fields.

References

CVE Name CVE-2023-28836
URL https://osv.dev/vulnerability/GHSA-5286-f2rf-35c2