| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-p5cm-246w-84jm | Wagtail Vulnerable to Cross-site Scripting in TableBlock class attributes |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 06 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 06 Mar 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wagtail
Wagtail wagtail |
|
| Vendors & Products |
Wagtail
Wagtail wagtail |
Thu, 05 Mar 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Wagtail is an open source content management system built on Django. Prior to versions 6.3.8, 7.0.6, 7.2.3, and 7.3.1, a stored cross-site scripting (XSS) vulnerability exists on rendering TableBlock blocks within a StreamField. A user with access to create or edit pages containing TableBlock StreamField blocks is able to set specially-crafted class attributes on the block which run arbitrary JavaScript code when the page is viewed. When viewed by a user with higher privileges, this could lead to performing actions with that user's credentials. The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin, and only affects sites using TableBlock. This issue has been patched in versions 6.3.8, 7.0.6, 7.2.3, and 7.3.1. | |
| Title | Wagtail: Improper escaping of HTML (Cross-site Scripting) on TableBlock class attributes | |
| Weaknesses | CWE-79 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-06T18:05:28.611Z
Reserved: 2026-02-25T15:28:40.650Z
Link: CVE-2026-28222
Updated: 2026-03-06T18:05:25.331Z
Status : Received
Published: 2026-03-05T20:16:15.277
Modified: 2026-03-05T20:16:15.277
Link: CVE-2026-28222
No data.
OpenCVE Enrichment
Updated: 2026-03-06T15:01:18Z
Github GHSA