CVE-2020-13258: Cross-site scripting in Contentful
6.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.84561%
CWE
Published
6/18/2021
Updated
2/1/2023
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
contentful | pip | < 1.12.4 | 1.12.4 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The core vulnerability exists in the query_string() function which takes raw user input from request.args and constructs a query string without any HTML escaping. This unsanitized output is then used in multiple template href attributes ({{ query_string }}), allowing injection of JavaScript via parameters. The function's direct handling of untrusted input without validation or encoding makes it the primary vulnerable component. Runtime detection would show this function processing malicious parameters like the 'api' payload before they're reflected in responses.