Описание
Wagtail CMS 6.4.1 is vulnerable to a Stored Cross-Site Scripting (XSS) in the document upload functionality. Attackers can inject malicious code inside a PDF file. When a user clicks the document in the CMS interface, the payload executes.
Wagtail CMS 6.4.1 is vulnerable to a Stored Cross-Site Scripting (XSS) in the document upload functionality. Attackers can inject malicious code inside a PDF file. When a user clicks the document in the CMS interface, the payload executes.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2025-45388
- https://github.com/wagtail/wagtail/pull/12672
- https://docs.wagtail.org/en/stable/deployment/under_the_hood.html#documents
- https://github.com/echoBRT/Wagtail-CMS-XSS
- https://github.com/wagtail/wagtail/discussions/12617
- https://github.com/wagtail/wagtail/wiki/Security-team
Связанные уязвимости
Wagtail CMS 6.4.1 is vulnerable to a Stored Cross-Site Scripting (XSS) in the document upload functionality. Attackers can inject malicious code inside a PDF file. When a user clicks the document in the CMS interface, the payload executes. NOTE: this is disputed by the Supplier because "It has been well documented that when serving uploaded files using a method outside of Wagtail (which admittedly is the default), it requires additional configuration from the developer, because Wagtail cannot control how these are served. ... For example, if a Wagtail instance is configured to upload files into AWS S3, Wagtail cannot control the permissions on how they're served, nor any headers used when serving them (a limitation of S3)."