CVE-2023-28836: Wagtail vulnerable to stored Cross-site Scripting attack via ModelAdmin views
(updated )
A stored cross-site scripting (XSS) vulnerability exists on ModelAdmin views within the Wagtail admin interface. A user with a limited-permission editor account for the Wagtail admin could potentially craft pages and documents that, when viewed by a user with higher privileges, could perform actions with that user’s credentials. The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin, and only affects sites with ModelAdmin enabled.
References
- docs.wagtail.org/en/stable/reference/contrib/modeladmin/chooseparentview.html
- docs.wagtail.org/en/stable/reference/contrib/modeladmin/inspectview.html
- github.com/advisories/GHSA-5286-f2rf-35c2
- github.com/pypa/advisory-database/tree/main/vulns/wagtail/PYSEC-2023-55.yaml
- github.com/wagtail/wagtail
- github.com/wagtail/wagtail/commit/5be2b1ed55fd7259dfdf2c82e7701dba407b8b62
- github.com/wagtail/wagtail/commit/bc84bf9815610cfbf8db3b6050c7ddcbaa4b9713
- github.com/wagtail/wagtail/commit/eefc3381d37b476791610e5d30594fae443f33af
- github.com/wagtail/wagtail/commit/ff806ab173a504395fdfb3139eb0a29444ab4b91
- github.com/wagtail/wagtail/releases/tag/v4.1.4
- github.com/wagtail/wagtail/releases/tag/v4.2.2
- github.com/wagtail/wagtail/security/advisories/GHSA-5286-f2rf-35c2
- nvd.nist.gov/vuln/detail/CVE-2023-28836
Detect and mitigate CVE-2023-28836 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →