-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| django-ajax-utilities | pip | < 1.2.8 | 1.2.8 |
The vulnerability stems from the ajax function's URL handling in pagination.js. The original code only checked if the URL started with '/' and didn't have two slashes. Attackers could bypass this by using backslashes (e.g., '#page:/\google.com'), which modern browsers normalize to valid URLs. The patch explicitly adds a check for '/\' to block this vector. The function's direct manipulation of untrusted URL input without proper sanitization matches the XSS vulnerability pattern described in CWE-79.
Ongoing coverage of React2Shell