CVE-2021-21383
- EPSS 0.26%
- Veröffentlicht 18.03.2021 17:15:13
- Zuletzt bearbeitet 21.11.2024 05:48:14
Wiki.js an open-source wiki app built on Node.js. Wiki.js before version 2.5.191 is vulnerable to stored cross-site scripting through mustache expressions in code blocks. This vulnerability exists due to mustache expressions being parsed by Vue durin...
CVE-2020-15274
- EPSS 0.59%
- Veröffentlicht 26.10.2020 19:15:12
- Zuletzt bearbeitet 21.11.2024 05:05:14
In Wiki.js before version 2.5.162, an XSS payload can be injected in a page title and executed via the search results. While the title is properly escaped in both the navigation links and the actual page title, it is not the case in the search result...
CVE-2020-15236
- EPSS 0.47%
- Veröffentlicht 05.10.2020 15:15:12
- Zuletzt bearbeitet 21.11.2024 05:05:09
In Wiki.js before version 2.5.151, directory traversal outside of Wiki.js context is possible when a storage module with local asset cache fetching is enabled. A malicious user can potentially read any file on the file system by crafting a special UR...
CVE-2020-4052
- EPSS 0.24%
- Veröffentlicht 16.06.2020 22:15:10
- Zuletzt bearbeitet 21.11.2024 05:32:13
In Wiki.js before 2.4.107, there is a stored cross-site scripting through template injection. This vulnerability exists due to an insecure validation mechanism intended to insert v-pre tags into rendered HTML elements which contain curly-braces. By c...
CVE-2020-11051
- EPSS 0.32%
- Veröffentlicht 05.05.2020 21:15:11
- Zuletzt bearbeitet 21.11.2024 04:56:41
In Wiki.js before 2.3.81, there is a stored XSS in the Markdown editor. An editor with write access to a page, using the Markdown editor, could inject an XSS payload into the content. If another editor (with write access as well) load the same page i...