Cross-site scripting (XSS) vulnerability in the dismissChangeRelatedObjectPopup function in contrib/admin/static/admin/js/admin/RelatedObjectLookups.js in Django before 1.8.14, 1.9.x before 1.9.8, and 1.10.x before 1.10rc1 allows remote attackers to inject arbitrary web script or HTML via vectors involving unsafe usage of Element.innerHTML.
https://www.exploit-db.com/exploits/40129/
https://www.djangoproject.com/weblog/2016/jul/18/security-releases/
https://github.com/django/django/commit/f68e5a99164867ab0e071a936470958ed867479d
https://github.com/django/django/commit/d03bf6fe4e9bf5b07de62c1a271c4b41a7d3d158
http://www.securitytracker.com/id/1036338
http://www.securityfocus.com/bid/92058
http://www.securityfocus.com/archive/1/538947/100/0/threaded
http://seclists.org/fulldisclosure/2016/Jul/53
http://rhn.redhat.com/errata/RHSA-2016-1596.html
http://rhn.redhat.com/errata/RHSA-2016-1595.html
http://rhn.redhat.com/errata/RHSA-2016-1594.html
http://packetstormsecurity.com/files/137965/Django-3.3.0-Script-Insertion.html
Published: 2016-08-05
Updated: 2025-04-12
Base Score: 4.3
Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N
Severity: Medium
Base Score: 6.1
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Severity: Medium
Base Score: 5.3
Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
Severity: Medium
EPSS: 0.14149