Django CMS 3.7.3 does not validate the plugin_type parameter while generating error messages for an invalid plugin type, resulting in a Cross Site Scripting (XSS) vulnerability. The vulnerability allows an attacker to execute arbitrary JavaScript code in the web browser of the affected user.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://sahildhar.github.io/blogpost/Django-CMS-Reflected-XSS-Vulnerability/ | third party advisory exploit |
https://www.django-cms.org/en/blog/2020/07/22/django-cms-security-updates-1/ | vendor advisory |