Page 2 of 6 results (0.003 seconds)

CVSS: 5.4EPSS: 0%CPEs: 3EXPL: 3

Wagtail is an open source content management system built on Django. A cross-site scripting vulnerability exists in versions 2.13-2.13.1, versions 2.12-2.12.4, and versions prior to 2.11.8. When the `{% include_block %}` template tag is used to output the value of a plain-text StreamField block (`CharBlock`, `TextBlock` or a similar user-defined block derived from `FieldBlock`), and that block does not specify a template for rendering, the tag output is not properly escaped as HTML. This could allow users to insert arbitrary HTML or scripting. This vulnerability is only exploitable by users with the ability to author StreamField content (i.e. users with 'editor' access to the Wagtail admin). • https://github.com/wagtail/wagtail/releases/tag/v2.11.8 https://github.com/wagtail/wagtail/releases/tag/v2.12.5 https://github.com/wagtail/wagtail/releases/tag/v2.13.2 https://github.com/wagtail/wagtail/security/advisories/GHSA-xfrw-hxr5-ghqf • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •