First published: Fri Aug 27 2021(Updated: )
Cross Site Scripting (XSS) in Mezzanine v4.3.1 allows remote attackers to execute arbitrary code via the 'Description' field of the component 'admin/blog/blogpost/add/'. This issue is different than CVE-2018-16632.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jupo Mezzanine | =4.3.1 | |
pip/Mezzanine | <=6.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-19002 is medium with a CVSS score of 6.1.
CVE-2020-19002 allows remote attackers to execute arbitrary code in Mezzanine v4.3.1 through the 'Description' field of the 'admin/blog/blogpost/add/' component using Cross Site Scripting (XSS).
CVE-2020-19002 can be exploited by remote attackers who can inject malicious code into the 'Description' field of the 'admin/blog/blogpost/add/' component in Mezzanine v4.3.1.
Yes, a fix for CVE-2020-19002 has been addressed in newer versions of Mezzanine. It is recommended to update to the latest version to mitigate the vulnerability.
More information about CVE-2020-19002 can be found at the following reference: https://github.com/stephenmcd/mezzanine/issues/1921