CVE-2021-25986: Cross-site Scripting in django-wiki
(updated )
In Django-wiki, versions 0.0.20 to 0.7.8 are vulnerable to Stored Cross-Site Scripting (XSS) in Notifications Section. An attacker who has access to edit pages can inject JavaScript payload in the title field. When a victim gets a notification regarding the changes made in the application, the payload in the notification panel renders and loads external JavaScript.
References
- github.com/advisories/GHSA-3m3h-v9hv-9j4h
- github.com/django-wiki/django-wiki
- github.com/django-wiki/django-wiki/commit/9eaccc7519e4206a4d2f22640882f0737b2da9c5
- github.com/django-wiki/django-wiki/pull/1148
- github.com/pypa/advisory-database/tree/main/vulns/wiki/PYSEC-2021-850.yaml
- nvd.nist.gov/vuln/detail/CVE-2021-25986
- pypi.org/project/wiki
- www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25986
Detect and mitigate CVE-2021-25986 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →