Safety vulnerability ID: 42807
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Wiki 0.7.9 includes a fix for CVE-2021-25986: In Django-wiki, versions 0.0.20 to 0.7.8 are vulnerable to Stored Cross-Site Scripting (XSS) in Notifications Section. An attacker who has access to edit pages can inject JavaScript payload in the title field. When a victim gets a notification regarding the changes made in the application, the payload in the notification panel renders and loads external JavaScript.
https://github.com/django-wiki/django-wiki/commit/9eaccc7519e4206a4d2f22640882f0737b2da9c5
https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25986
Latest version: 0.11.2
A wiki system written for the Django framework.
In Django-wiki, versions 0.0.20 to 0.7.8 are vulnerable to Stored Cross-Site Scripting (XSS) in Notifications Section. An attacker who has access to edit pages can inject JavaScript payload in the title field. When a victim gets a notification regarding the changes made in the application, the payload in the notification panel renders and loads external JavaScript. See CVE-2021-25986.
MISC:https://github.com/django-wiki/django-wiki/commit/9eaccc7519e4206a4d2f22640882f0737b2da9c5: https://github.com/django-wiki/django-wiki/commit/9eaccc7519e4206a4d2f22640882f0737b2da9c5
MISC:https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25986: https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25986
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application