6.4.1
11 years ago
2 months ago
Known vulnerabilities in the wagtail package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
wagtail is an open source content management system built on Django. Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) through the Note: This is only exploitable if the site uses the default or a custom search implementation that employs How to fix Regular Expression Denial of Service (ReDoS)? Upgrade | [,5.2.6)[6.0,6.0.6)[6.1,6.1.3) |
wagtail is an open source content management system built on Django. Affected versions of this package are vulnerable to Improper Handling of Insufficient Permissions or Privileges in the How to fix Improper Handling of Insufficient Permissions or Privileges? Upgrade | [,6.0.5)[6.1rc1,6.1.2) |
wagtail is an open source content management system built on Django. Affected versions of this package are vulnerable to Race Condition in How to fix Race Condition? Upgrade | [,5.2rc1) |
wagtail is an open source content management system built on Django. Affected versions of this package are vulnerable to Race Condition in How to fix Race Condition? Upgrade | [,5.2rc1) |
wagtail is an open source content management system built on Django. Affected versions of this package are vulnerable to Direct Request ('Forced Browsing') through the admin bulk action views. An attacker can disclose user names by making a direct URL request. Note: This is only exploitable if the attacker has a limited-permission editor account for the How to fix Direct Request ('Forced Browsing')? Upgrade | [,4.1.9)[4.2,5.0.5)[5.1,5.1.3) |