Mezzanine CMS, in versions prior to 6.1.1, contains a Stored Cross-Site Scripting (XSS) vulnerability in the admin interface. The vulnerability exists in the "displayable_links_js" function, which fails to properly sanitize blog post titles before including them in JSON responses served via "/admin/displayable_links.js". An authenticated admin user can create a blog post with a malicious JavaScript payload in the title field, then trick another admin user into clicking a direct link to the "/admin/displayable_links.js" endpoint, causing the malicious script to execute in their browser.
Metrics
Affected Vendors & Products
References
History
Tue, 17 Jun 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 17 Jun 2025 11:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Mezzanine CMS, in versions prior to 6.1.1, contains a Stored Cross-Site Scripting (XSS) vulnerability in the admin interface. The vulnerability exists in the "displayable_links_js" function, which fails to properly sanitize blog post titles before including them in JSON responses served via "/admin/displayable_links.js". An authenticated admin user can create a blog post with a malicious JavaScript payload in the title field, then trick another admin user into clicking a direct link to the "/admin/displayable_links.js" endpoint, causing the malicious script to execute in their browser. | |
Title | Stored Cross-Site Scripting (XSS) in Mezzanine CMS Admin Interface | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: Checkmarx
Published: 2025-06-17T11:06:12.360Z
Updated: 2025-06-17T14:20:26.648Z
Reserved: 2025-06-13T08:50:32.031Z
Link: CVE-2025-6050

Updated: 2025-06-17T14:19:12.952Z

Status : Received
Published: 2025-06-17T11:15:22.400
Modified: 2025-06-17T11:15:22.400
Link: CVE-2025-6050

No data.