CVE-2025-45388
Severity CVSS v4.0:
Pending analysis
Type:
CWE-79
Cross-Site Scripting (XSS)
Publication date:
07/05/2025
Last modified:
15/04/2026
Description
Wagtail CMS 6.4.1 is vulnerable to a Stored Cross-Site Scripting (XSS) in the document upload functionality. Attackers can inject malicious code inside a PDF file. When a user clicks the document in the CMS interface, the payload executes. NOTE: this is disputed by the Supplier because "It has been well documented that when serving uploaded files using a method outside of Wagtail (which admittedly is the default), it requires additional configuration from the developer, because Wagtail cannot control how these are served. ... For example, if a Wagtail instance is configured to upload files into AWS S3, Wagtail cannot control the permissions on how they're served, nor any headers used when serving them (a limitation of S3)."
Impact
Base Score 3.x
6.10
Severity 3.x
MEDIUM
References to Advisories, Solutions, and Tools
- https://docs.wagtail.org/en/stable/deployment/under_the_hood.html#documents
- https://github.com/echoBRT/Wagtail-CMS-XSS/
- https://github.com/wagtail/wagtail/discussions/12617
- https://github.com/wagtail/wagtail/pull/12672
- https://github.com/wagtail/wagtail/wiki/Security-team
- https://github.com/echoBRT/Wagtail-CMS-XSS/



