Vulnerability Details CVE-2021-29434
Wagtail is a Django content management system. In affected versions of Wagtail, when saving the contents of a rich text field in the admin interface, Wagtail does not apply server-side checks to ensure that link URLs use a valid protocol. A malicious user with access to the admin interface could thus craft a POST request to publish content with `javascript:` URLs containing arbitrary code. The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin. See referenced GitHub advisory for additional details, including a workaround. Patched versions have been released as Wagtail 2.11.7 (for the LTS 2.11 branch) and Wagtail 2.12.4 (for the current 2.12 branch).
Exploit prediction scoring system (EPSS) score
EPSS Score 0.003
EPSS Ranking 50.5%
CVSS Severity
CVSS v3 Score 6.1
CVSS v2 Score 3.5
Products affected by CVE-2021-29434
-
cpe:2.3:a:torchbox:wagtail:*
-
cpe:2.3:a:torchbox:wagtail:2.12.0
-
cpe:2.3:a:torchbox:wagtail:2.12.1
-
cpe:2.3:a:torchbox:wagtail:2.12.2
-
cpe:2.3:a:torchbox:wagtail:2.12.3