{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-11T11:43:55.641","vulnerabilities":[{"cve":{"id":"CVE-2020-11001","sourceIdentifier":"security-advisories@github.com","published":"2020-04-14T23:15:11.917","lastModified":"2024-11-21T04:56:33.267","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In Wagtail before versions 2.8.1 and 2.7.2, a cross-site scripting (XSS) vulnerability exists on the page revision\ncomparison view within the Wagtail admin interface. A user with a limited-permission editor account for the Wagtail\nadmin could potentially craft a page revision history that, when viewed by a user with higher privileges, could perform\nactions with that user's credentials. The vulnerability is not exploitable by an ordinary site visitor without access to\nthe Wagtail admin.\n\nPatched versions have been released as Wagtail 2.7.2 (for the LTS 2.7 branch) and Wagtail 2.8.1 (for the current 2.8 branch)."},{"lang":"es","value":"En Wagtail versiones anteriores a 2.8.1 y 2.7.2, se presenta una vulnerabilidad de tipo cross-site scripting (XSS) en la vista de comparación de la revisión de página dentro de la interfaz de administración de Wagtail. Un usuario con una cuenta editor con permisos limitados para el administrador de Wagtail podría crear un historial de revisión de la página que, cuando la visualice un usuario con más altos privilegios, podría llevar a cabo acciones con las credenciales de ese usuario. La vulnerabilidad no es explotable por un visitante ordinario del sitio sin acceso al administrador de Wagtail. Las versiones parcheadas han sido publicadas como Wagtail versión 2.7.2 (para la rama LTS versión 2.7) y Wagtail versión 2.8.1 (para la rama actual 2.8)."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N","baseScore":5.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.3,"impactScore":4.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N","baseScore":6.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":4.0}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:N/I:P/A:N","baseScore":3.5,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":6.8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"},{"lang":"en","value":"CWE-80"}]},{"source":"nvd@nist.gov","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:torchbox:wagtail:*:*:*:*:*:*:*:*","versionStartIncluding":"1.9","versionEndIncluding":"2.7.1","matchCriteriaId":"B846C075-8189-4C8F-BDF3-A6C88AF3C19B"},{"vulnerable":true,"criteria":"cpe:2.3:a:torchbox:wagtail:2.8:*:*:*:*:*:*:*","matchCriteriaId":"99FC794D-1CE6-4E31-A5F2-67767286E9DE"}]}]}],"references":[{"url":"https://github.com/wagtail/wagtail/security/advisories/GHSA-v2wc-pfq2-5cm6","source":"security-advisories@github.com","tags":["Exploit","Third Party Advisory"]},{"url":"https://github.com/wagtail/wagtail/commit/61045ceefea114c40ac4b680af58990dbe732389","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://github.com/wagtail/wagtail/releases/tag/v2.8.1","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://github.com/wagtail/wagtail/security/advisories/GHSA-v2wc-pfq2-5cm6","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}