CVE-2020-15274

Stored XSS via search result in Wiki.js

Description

In Wiki.js before version 2.5.162, an XSS payload can be injected in a page title and executed via the search results. While the title is properly escaped in both the navigation links and the actual page title, it is not the case in the search results. Commit a57d9af34c15adbf460dde6553d964efddf433de fixes this vulnerability (version 2.5.162) by properly escaping the text content displayed in the search results.

Category

5.8
CVSS
Severity: Medium
CVSS 3.1 •
CVSS 2.0 •
EPSS 0.59%
Vendor Advisory requarks.io
Affected: Requarks wiki.js
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2020-15274?
CVE-2020-15274 has been scored as a medium severity vulnerability.
How to fix CVE-2020-15274?
To fix CVE-2020-15274, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2020-15274 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2020-15274 is being actively exploited. According to its EPSS score, there is a ~1% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2020-15274?
CVE-2020-15274 affects Requarks wiki.js.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.