CVE-2025-45388

medium

Description

Wagtail CMS 6.4.1 is vulnerable to a Stored Cross-Site Scripting (XSS) in the document upload functionality. Attackers can inject malicious code inside a PDF file. When a user clicks the document in the CMS interface, the payload executes. NOTE: this is disputed by the Supplier because "It has been well documented that when serving uploaded files using a method outside of Wagtail (which admittedly is the default), it requires additional configuration from the developer, because Wagtail cannot control how these are served. ... For example, if a Wagtail instance is configured to upload files into AWS S3, Wagtail cannot control the permissions on how they're served, nor any headers used when serving them (a limitation of S3)."

References

https://github.com/wagtail/wagtail/wiki/Security-team

https://github.com/wagtail/wagtail/pull/12672

https://github.com/wagtail/wagtail/discussions/12617

https://github.com/echoBRT/Wagtail-CMS-XSS/

https://docs.wagtail.org/en/stable/deployment/under_the_hood.html#documents

Details

Source: Mitre, NVD

Published: 2025-05-07

Updated: 2025-05-09

Risk Information

CVSS v2

Base Score: 6.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N

Severity: Medium

CVSS v3

Base Score: 6.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Severity: Medium

EPSS

EPSS: 0.00018