Description
In Wiki.js before version 2.5.162, an XSS payload can be injected in a page title and executed via the search results. While the title is properly escaped in both the navigation links and the actual page title, it is not the case in the search results. Commit a57d9af34c15adbf460dde6553d964efddf433de fixes this vulnerability (version 2.5.162) by properly escaping the text content displayed in the search results.
Published: 2020-10-26
Score: 5.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2020-7275 In Wiki.js before version 2.5.162, an XSS payload can be injected in a page title and executed via the search results. While the title is properly escaped in both the navigation links and the actual page title, it is not the case in the search results. Commit a57d9af34c15adbf460dde6553d964efddf433de fixes this vulnerability (version 2.5.162) by properly escaping the text content displayed in the search results.
History

No history.

Subscriptions

Requarks Wiki.js
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-04T13:15:19.876Z

Reserved: 2020-06-25T00:00:00.000Z

Link: CVE-2020-15274

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-10-26T19:15:12.863

Modified: 2024-11-21T05:05:14.800

Link: CVE-2020-15274

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses