CVE-2025-45388

Wagtail CMS 6.4.1 is vulnerable to a Stored Cross-Site Scripting (XSS) in the document upload functionality. Attackers can inject malicious code inside a PDF file. When a user clicks the document in the CMS interface, the payload executes. NOTE: this is disputed by the Supplier because "It has been well documented that when serving uploaded files using a method outside of Wagtail (which admittedly is the default), it requires additional configuration from the developer, because Wagtail cannot control how these are served. ... For example, if a Wagtail instance is configured to upload files into AWS S3, Wagtail cannot control the permissions on how they're served, nor any headers used when serving them (a limitation of S3)."
Configurations

No configuration.

History

09 May 2025, 14:15

Type Values Removed Values Added
References
  • () https://docs.wagtail.org/en/stable/deployment/under_the_hood.html#documents -
  • () https://github.com/wagtail/wagtail/discussions/12617 -
  • () https://github.com/wagtail/wagtail/pull/12672 -
  • () https://github.com/wagtail/wagtail/wiki/Security-team -
Summary (en) Wagtail CMS 6.4.1 is vulnerable to a Stored Cross-Site Scripting (XSS) in the document upload functionality. Attackers can inject malicious code inside a PDF file. When a user clicks the document in the CMS interface, the payload executes. (en) Wagtail CMS 6.4.1 is vulnerable to a Stored Cross-Site Scripting (XSS) in the document upload functionality. Attackers can inject malicious code inside a PDF file. When a user clicks the document in the CMS interface, the payload executes. NOTE: this is disputed by the Supplier because "It has been well documented that when serving uploaded files using a method outside of Wagtail (which admittedly is the default), it requires additional configuration from the developer, because Wagtail cannot control how these are served. ... For example, if a Wagtail instance is configured to upload files into AWS S3, Wagtail cannot control the permissions on how they're served, nor any headers used when serving them (a limitation of S3)."

08 May 2025, 16:15

Type Values Removed Values Added
CWE CWE-79
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1
References () https://github.com/echoBRT/Wagtail-CMS-XSS/ - () https://github.com/echoBRT/Wagtail-CMS-XSS/ -

08 May 2025, 14:39

Type Values Removed Values Added
Summary
  • (es) Wagtail CMS 6.4.1 es vulnerable a un ataque de Cross-Site Scripting (XSS) almacenado en la función de carga de documentos. Los atacantes pueden inyectar código malicioso en un archivo PDF. Cuando un usuario hace clic en el documento en la interfaz del CMS, se ejecuta el payload.

07 May 2025, 19:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-07 19:16

Updated : 2025-05-09 14:15


NVD link : CVE-2025-45388

Mitre link : CVE-2025-45388

CVE.ORG link : CVE-2025-45388


JSON object : View

Products Affected

No product.

CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')