Description
Wagtail is an open source content management system built on Django. Prior to 7.0.7, 7.3.2, and 7.4, the Documents and Images API incorrectly listed items in private collections. A user with access to the API could see the filename and name of documents and images in private collections. This vulnerability is fixed in 7.0.7, 7.3.2, and 7.4.
Published: 2026-05-11
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability arises from improper restriction handling in the Documents and Images API, allowing an API user to enumerate filenames and names that belong to private collections. The affected data originates from the private collection metadata, so the impact is the potential disclosure of document identities and indirectly the content of private collections. The weakness corresponds to CWE-280, an improper limitation of permissions error.

Affected Systems

The affected systems are installations of the Wagtail content management system prior to version 7.0.7, 7.3.2, or 7.4. Any deployment of those versions that exposes the Documents or Images API is vulnerable. The fix is available in the listed patch releases.

Risk and Exploitability

The CVSS score indicates a medium severity level of 5.3. No EPSS value is available, and the vulnerability is not listed in the CISA KEV catalog, implying a moderate likelihood of exploitation under normal circumstances. The likely attack vector is a legitimate API access request, meaning that an authenticated user who is authorized to call the API can trigger the disclosure; thus, proper access controls on the API endpoints are essential. Failure to patch the system exposes private document metadata to any API client that can reach the endpoint.

Generated by OpenCVE AI on May 11, 2026 at 16:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Wagtail to 7.0.7, 7.3.2, or 7.4, the versions that contain the fix for the API listing issue.
  • Restrict the Documents and Images API endpoint to users with appropriate permissions, ensuring that only authorized staff can invoke it.
  • Review and tighten collection visibility settings to enforce that private collections do not expose any metadata to external requests.

Generated by OpenCVE AI on May 11, 2026 at 16:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-p5gm-92h4-6pv6 Wagtail has improper restriction handling on Documents and Images API
History

Tue, 12 May 2026 16:00:00 +0000

Type Values Removed Values Added
First Time appeared Torchbox
Torchbox wagtail
CPEs cpe:2.3:a:torchbox:wagtail:*:*:*:*:*:*:*:*
Vendors & Products Torchbox
Torchbox wagtail

Tue, 12 May 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 11 May 2026 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Wagtail
Wagtail wagtail
Vendors & Products Wagtail
Wagtail wagtail

Mon, 11 May 2026 15:30:00 +0000

Type Values Removed Values Added
Description Wagtail is an open source content management system built on Django. Prior to 7.0.7, 7.3.2, and 7.4, the Documents and Images API incorrectly listed items in private collections. A user with access to the API could see the filename and name of documents and images in private collections. This vulnerability is fixed in 7.0.7, 7.3.2, and 7.4.
Title Wagtail: Improper restriction handling on Documents and Images API
Weaknesses CWE-280
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-12T13:45:39.924Z

Reserved: 2026-05-05T15:13:47.571Z

Link: CVE-2026-44201

cve-icon Vulnrichment

Updated: 2026-05-12T13:45:33.233Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-11T16:17:35.850

Modified: 2026-05-12T15:59:06.407

Link: CVE-2026-44201

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-11T17:00:15Z

Weaknesses