CVE-2020-25626

medium

Description

A flaw was found in Django REST Framework versions before 3.12.0 and before 3.11.2. When using the browseable API viewer, Django REST Framework fails to properly escape certain strings that can come from user input. This allows a user who can control those strings to inject malicious <script> tags, leading to a cross-site-scripting (XSS) vulnerability.

References

https://www.debian.org/security/2022/dsa-5186

https://security.netapp.com/advisory/ntap-20201016-0003/

https://bugzilla.redhat.com/show_bug.cgi?id=1878635

Details

Source: Mitre, NVD

Published: 2020-09-30

Risk Information

CVSS v2

Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Severity: Medium

CVSS v3

Base Score: 6.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Severity: Medium