Skip to content

kevinpdicks/Mezzanine-CMS-6.1.0-XSS

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 

Repository files navigation

Mezzanine-CMS-6.1.0-XSS (CVE-2025-50481)

Description

A cross-site scripting (XSS) vulnerability in the component /blog/blogpost/add of Mezzanine CMS v6.1.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into a blog post.

CVE:

CVE-2025-50481

Affected version:

Mezzanine CMS 6.1.0

Base Score:

4.8 Medium

Vector:

CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N

References
Summary

Mezzanine CMS 6.1.0 version is affected by a stored cross-site scripting (XSS) vulnerability.

A XSS vulnerability exists in the new blog post functionality on the CMS, where an malicious authenticated attacker can craft a carefully formatted blog post containing JavaScript code, which is executed by the browser.

An attacker can leverage the XSS vulnerability to carry out attacks against the CMS website, such as defacement, or tamper with the site and cause it to be unavailable (denial-of-service).

Technical Description

Mezzanine CMS 6.1.0 running on Ubuntu Server 20.04.6 LTS (Focal Fossa) from pip package: image

First an authenticated attacker creates a new blog post: image

Assign blog post a title: image

Create the XSS proof-of-concept (PoC) within the source code formatting of the blog post: image

Save the new blog post: image

The blog post can be published and then accessed by any user: image

Accessing the blog post with the XSS PoC triggers the JavaScript code in the browser: image

PoC was tested using Firefox browser version 136.0 (64-bit): image

Note: Session hijacking with the XSS vulnerability is not possible, as the sessionid session cookie is not accessible, since it is configured with the HttpOnly security attribute: image

About

Mezzanine CMS 6.1.0 XSS (CVE-2025-50481)

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published