We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-6050

Stored Cross-Site Scripting (XSS) in Mezzanine CMS Admin Interface



Description

Mezzanine CMS, in versions prior to 6.1.1, contains a Stored Cross-Site Scripting (XSS) vulnerability in the admin interface. The vulnerability exists in the "displayable_links_js" function, which fails to properly sanitize blog post titles before including them in JSON responses served via "/admin/displayable_links.js". An authenticated admin user can create a blog post with a malicious JavaScript payload in the title field, then trick another admin user into clicking a direct link to the "/admin/displayable_links.js" endpoint, causing the malicious script to execute in their browser.

Reserved 2025-06-13 | Published 2025-06-17 | Updated 2025-06-17 | Assigner Checkmarx


MEDIUM: 4.8CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:L/VI:L/VA:N/SC:L/SI:N/SA:N

Problem types

CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')

Product status

Default status
unaffected

0.1 before 6.1.1
affected

References

github.com/stephenmcd/mezzanine/discussions/2080

https/...ine/commit/898630d8df48cf3ddb8b9942f59168b93216e3f8

cve.org (CVE-2025-6050)

nvd.nist.gov (CVE-2025-6050)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-6050

Support options

Helpdesk Chat, Email, Knowledgebase