// For flags

CVE-2022-21683

Comment reply notifications sent to incorrect users in wagtail

Severity Score

4.3
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Wagtail is a Django based content management system focused on flexibility and user experience. When notifications for new replies in comment threads are sent, they are sent to all users who have replied or commented anywhere on the site, rather than only in the relevant threads. This means that a user could listen in to new comment replies on pages they have not have editing access to, as long as they have left a comment or reply somewhere on the site. A patched version has been released as Wagtail 2.15.2, which restores the intended behaviour - to send notifications for new replies to the participants in the active thread only (editing permissions are not considered). New comments can be disabled by setting `WAGTAILADMIN_COMMENTS_ENABLED = False` in the Django settings file.

Wagtail es un sistema de administración de contenidos basado en Django y centrado en la flexibilidad y la experiencia del usuario. Cuando son enviadas notificaciones de nuevas respuestas en los hilos de comentarios, son enviados a todos los usuarios que han respondido o comentado en cualquier parte del sitio, en lugar de hacerlo sólo en los hilos correspondientes. Esto significa que un usuario puede escuchar las respuestas a nuevos comentarios en páginas a las que no presenta acceso de edición, siempre que haya dejado un comentario o respuesta en algún lugar del sitio. Ha sido publicada una versión parcheada como Wagtail 2.15.2, que restablece el comportamiento previsto: enviar notificaciones de nuevas respuestas sólo a participantes en el hilo activo (no es tomado en cuenta los permisos de edición). Los nuevos comentarios pueden deshabilitarse al establecer "WAGTAILADMIN_COMMENTS_ENABLED = False" en el archivo de configuración de Django

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-11-16 CVE Reserved
  • 2022-01-18 CVE Published
  • 2023-08-11 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Torchbox
Search vendor "Torchbox"
Wagtail
Search vendor "Torchbox" for product "Wagtail"
>= 2.13 < 2.15.2
Search vendor "Torchbox" for product "Wagtail" and version " >= 2.13 < 2.15.2"
-
Affected