CVE-2025-6050: Mezzanine CMS has a Stored Cross-Site Scripting (XSS) vulnerability in the displayable_links_js function
4.8
CVSS Score
4.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.17715%
CWE
Published
6/17/2025
Updated
6/17/2025
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:L/VI:L/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
Mezzanine | pip | < 6.1.1 | 6.1.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability description explicitly mentions the displayable_links_js
function as the source of the Stored XSS. The provided commit patch confirms this by showing a modification within this function in the file mezzanine/core/views.py
. The patch introduces the escape()
function from django.utils.html
to sanitize the title
variable, which is derived from obj.title
or obj.titles
. Before this change, the unsanitized title was used, leading to the XSS vulnerability when the /admin/displayable_links.js
endpoint was accessed. Therefore, mezzanine.core.views.displayable_links_js
is the vulnerable function as it processed and outputted unsanitized user-supplied data (blog post titles).