First published: Sat Jul 23 2022(Updated: )
Django REST framework (aka django-rest-framework) before 3.9.1 allows XSS because the default DRF Browsable API view templates disable autoescaping.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/django-rest-framework | <3.9.1 | 3.9.1 |
Django REST framework | <3.9.1 |
https://github.com/encode/django-rest-framework/commit/4bb9a3c48427867ef1e46f7dee945a4c25a4f9b8
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-25045 has a medium severity rating due to its potential for cross-site scripting (XSS) vulnerabilities.
To fix CVE-2018-25045, upgrade Django REST framework to version 3.9.1 or later.
CVE-2018-25045 exposes applications to XSS attacks due to the lack of autoescaping in the default DRF Browsable API view templates.
Anyone using Django REST framework version prior to 3.9.1 is affected by CVE-2018-25045.
CVE-2018-25045 only impacts versions of Django REST framework before 3.9.1, earlier versions are vulnerable.