Miggo Logo

CVE-2025-29573:
Mezzanine CMS Cross-Site Scripting (XSS) vulnerability

6.1

CVSS Score
3.1

Basic Information

EPSS Score
0.12969%
Published
5/5/2025
Updated
5/6/2025
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
Mezzaninepip<= 6.0.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability description and the squadappsec.com advisory clearly point to an XSS issue in the 'View Entries' feature of the Forms module in Mezzanine CMS. The advisory specifically identifies the vulnerable line of code: field_value = mark_safe('<a href="%s">%s</a>' % parts) within mezzanine/forms/forms.py. By fetching the content of this file, I located this line within the rows method of the EntriesForm class. This method is responsible for preparing form entry data for display. The mark_safe function is used with user-supplied data (the filename) without prior sanitization, which is a classic XSS vulnerability pattern. The filename is part of the parts variable, specifically split(field_entry.value)[1]. This makes the mezzanine.forms.forms.EntriesForm.rows function the direct location of the vulnerability.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*ross-Sit* S*riptin* (XSS) vuln*r**ility *xists in M*zz*nin* *MS *.*.* in t** "Vi*w *ntri*s" ***tur* wit*in t** *orms mo*ul*.

Reasoning

T** vuln*r**ility **s*ription *n* t** squ***pps**.*om **visory *l**rly point to *n XSS issu* in t** 'Vi*w *ntri*s' ***tur* o* t** *orms mo*ul* in M*zz*nin* *MS. T** **visory sp**i*i**lly i**nti*i*s t** vuln*r**l* lin* o* *o**: `*i*l*_v*lu* = m*rk_s**