CVE-2018-16405:
mayan-edms Cross-site Scripting vulnerability
6.1
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.55325%
CWE
Published
9/6/2018
Updated
9/30/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
mayan-edms | pip | < 3.0.2 | 3.0.2 |
mayan-edms-ng | pip | >= 0, < 3.0.2 | 3.0.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from client-side JavaScript in base_plain.html that unsafely sets window.location using URL hash input. While the XSS execution occurs client-side, the server-side views that render this template (used by authentication endpoints) are critical components in delivering the vulnerable code. The affected URLs (/authentication/login/, /authentication/password/reset/, etc.) correspond to Django view classes in the authentication app that would appear in server-side profiler traces when these endpoints are accessed. Confidence is medium as we infer view names from URL patterns and Django conventions, though exact implementation details aren't shown in provided patches.