6.4.1
11 years ago
2 months ago
Known vulnerabilities in the wagtail package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
wagtail is an open source content management system built on Django. Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) through the Note: This is only exploitable if the site uses the default or a custom search implementation that employs How to fix Regular Expression Denial of Service (ReDoS)? Upgrade | [,5.2.6)[6.0,6.0.6)[6.1,6.1.3) |
wagtail is an open source content management system built on Django. Affected versions of this package are vulnerable to Improper Handling of Insufficient Permissions or Privileges in the How to fix Improper Handling of Insufficient Permissions or Privileges? Upgrade | [,6.0.5)[6.1rc1,6.1.2) |
wagtail is an open source content management system built on Django. Affected versions of this package are vulnerable to Race Condition in How to fix Race Condition? Upgrade | [,5.2rc1) |
wagtail is an open source content management system built on Django. Affected versions of this package are vulnerable to Race Condition in How to fix Race Condition? Upgrade | [,5.2rc1) |
wagtail is an open source content management system built on Django. Affected versions of this package are vulnerable to Direct Request ('Forced Browsing') through the admin bulk action views. An attacker can disclose user names by making a direct URL request. Note: This is only exploitable if the attacker has a limited-permission editor account for the How to fix Direct Request ('Forced Browsing')? Upgrade | [,4.1.9)[4.2,5.0.5)[5.1,5.1.3) |
wagtail is an open source content management system built on Django. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the Note:
The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin, and only affects sites with How to fix Cross-site Scripting (XSS)? Upgrade | [1.5,4.1.4)[4.2,4.2.2) |
wagtail is an open source content management system built on Django. Affected versions of this package are vulnerable to Denial of Service (DoS) due to improper file size validation, which allows a user with access to upload images or documents through the Wagtail admin interface to upload a very large file. Note: The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin. It can only be exploited by admin users with permission to upload images or documents. How to fix Denial of Service (DoS)? Upgrade | [,4.1.4)[4.2,4.2.2) |