Skip to main content

CVE-2021-25986: CWE-79 Cross-site Scripting (XSS) in Django-wiki Django-wiki

Medium
VulnerabilityCVE-2021-25986cvecve-2021-25986cwe-79
Published: Tue Nov 23 2021 (11/23/2021, 19:17:08 UTC)
Source: CVE
Vendor/Project: Django-wiki
Product: Django-wiki

Description

In Django-wiki, versions 0.0.20 to 0.7.8 are vulnerable to Stored Cross-Site Scripting (XSS) in Notifications Section. An attacker who has access to edit pages can inject JavaScript payload in the title field. When a victim gets a notification regarding the changes made in the application, the payload in the notification panel renders and loads external JavaScript.

AI-Powered Analysis

AILast updated: 06/25/2025, 09:01:14 UTC

Technical Analysis

CVE-2021-25986 is a stored Cross-Site Scripting (XSS) vulnerability affecting Django-wiki versions from 0.0.20 up to 0.7.8. Django-wiki is a Django-based wiki application used for collaborative documentation and knowledge management. The vulnerability resides in the Notifications Section, where an attacker with editing privileges can inject malicious JavaScript code into the title field of a page. This malicious payload is then stored and subsequently rendered in the notification panel when other users receive notifications about changes made within the application. Because the payload executes in the context of the victim's browser, it can lead to session hijacking, credential theft, or execution of arbitrary actions on behalf of the victim. The vulnerability requires the attacker to have at least limited privileges (edit access) and the victim to interact with the notification UI, which triggers the payload execution. The CVSS v3.1 score is 5.4 (medium severity), reflecting the network attack vector, low attack complexity, requirement for privileges, and user interaction. The vulnerability impacts confidentiality and integrity but does not affect availability. No known exploits in the wild have been reported, and no official patches are linked in the provided data, indicating that mitigation may require manual updates or configuration changes. This vulnerability is classified under CWE-79, which is a common and well-understood web application security issue related to improper input sanitization and output encoding in web applications.

Potential Impact

For European organizations using Django-wiki for internal or external documentation, this vulnerability poses a risk of unauthorized script execution within user browsers. The impact includes potential theft of session cookies, unauthorized actions performed on behalf of users, and exposure of sensitive information. Since the vulnerability requires an attacker to have editing privileges, the risk is higher in environments with many contributors or less stringent access controls. The exploitation could lead to lateral movement within the organization’s web applications or compromise of user accounts, especially if single sign-on or session tokens are involved. The medium CVSS score reflects moderate risk, but the impact can be significant in sectors where data confidentiality and integrity are critical, such as finance, healthcare, and government. Additionally, the stored nature of the XSS means the malicious payload persists and can affect multiple users over time. European organizations with collaborative wiki environments should be aware that attackers could leverage this vulnerability to target employees or partners, potentially leading to data breaches or reputational damage.

Mitigation Recommendations

1. Restrict edit permissions strictly to trusted users to minimize the risk of malicious payload injection. 2. Implement input validation and output encoding on the title field and any other user-editable fields to sanitize inputs and prevent script injection. 3. If possible, upgrade Django-wiki to a version where this vulnerability is patched; if no official patch exists, consider applying custom patches or disabling the notification feature temporarily. 4. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of XSS attacks. 5. Educate users to be cautious when interacting with notifications and consider disabling JavaScript execution in notifications if configurable. 6. Monitor logs and user activity for unusual editing behavior or unexpected notifications that could indicate exploitation attempts. 7. Conduct regular security audits and penetration testing focused on web application vulnerabilities, including XSS, especially in collaborative platforms. 8. Consider isolating the wiki application within a segmented network zone to limit potential lateral movement if compromised.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Mend
Date Reserved
2021-01-22T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983bc4522896dcbedd17

Added to database: 5/21/2025, 9:09:15 AM

Last enriched: 6/25/2025, 9:01:14 AM

Last updated: 8/5/2025, 3:24:42 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats