CVE-2025-29573:
Mezzanine CMS Cross-Site Scripting (XSS) vulnerability
6.1
Basic Information
Technical Details
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
Mezzanine | pip | <= 6.0.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability description and the squadappsec.com advisory clearly point to an XSS issue in the 'View Entries' feature of the Forms module in Mezzanine CMS. The advisory specifically identifies the vulnerable line of code: field_value = mark_safe('<a href="%s">%s</a>' % parts)
within mezzanine/forms/forms.py
. By fetching the content of this file, I located this line within the rows
method of the EntriesForm
class. This method is responsible for preparing form entry data for display. The mark_safe
function is used with user-supplied data (the filename) without prior sanitization, which is a classic XSS vulnerability pattern. The filename is part of the parts
variable, specifically split(field_entry.value)[1]
. This makes the mezzanine.forms.forms.EntriesForm.rows
function the direct location of the vulnerability.