Mezzanine CMS has a Stored Cross-Site Scripting (XSS) vulnerability in the displayable_links_js function
Moderate severity
GitHub Reviewed
Published
Jun 17, 2025
to the GitHub Advisory Database
•
Updated Jun 17, 2025
Description
Published by the National Vulnerability Database
Jun 17, 2025
Published to the GitHub Advisory Database
Jun 17, 2025
Reviewed
Jun 17, 2025
Last updated
Jun 17, 2025
Mezzanine CMS, in versions prior to 6.1.1, contains a Stored Cross-Site Scripting (XSS) vulnerability in the admin interface. The vulnerability exists in the "displayable_links_js" function, which fails to properly sanitize blog post titles before including them in JSON responses served via "/admin/displayable_links.js". An authenticated admin user can create a blog post with a malicious JavaScript payload in the title field, then trick another admin user into clicking a direct link to the "/admin/displayable_links.js" endpoint, causing the malicious script to execute in their browser.
References