Wagtail is a Django content management system. In affected versions of Wagtail, when saving the contents of a rich text field in the admin interface, Wagtail does not apply server-side checks to ensure that link URLs use a valid protocol. A malicious user with access to the admin interface could thus craft a POST request to publish content with `javascript:` URLs containing arbitrary code. The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin. See referenced GitHub advisory for additional details, including a workaround. Patched versions have been released as Wagtail 2.11.7 (for the LTS 2.11 branch) and Wagtail 2.12.4 (for the current 2.12 branch).
Advisories
Source ID Title
EUVD EUVD EUVD-2021-0462 Wagtail is a Django content management system. In affected versions of Wagtail, when saving the contents of a rich text field in the admin interface, Wagtail does not apply server-side checks to ensure that link URLs use a valid protocol. A malicious user with access to the admin interface could thus craft a POST request to publish content with `javascript:` URLs containing arbitrary code. The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin. See referenced GitHub advisory for additional details, including a workaround. Patched versions have been released as Wagtail 2.11.7 (for the LTS 2.11 branch) and Wagtail 2.12.4 (for the current 2.12 branch).
Github GHSA Github GHSA GHSA-wq5h-f9p5-q7fx Improper validation of URLs ('Cross-site Scripting') in Wagtail rich text fields
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-03T22:02:51.911Z

Reserved: 2021-03-30T00:00:00

Link: CVE-2021-29434

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-04-19T19:15:17.610

Modified: 2024-11-21T06:01:05.397

Link: CVE-2021-29434

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses