CVE-2023-28836
Python vulnerability analysis and mitigation

Overview

A stored cross-site scripting (XSS) vulnerability (CVE-2023-28836) was discovered in Wagtail, an open source content management system built on Django. The vulnerability affects versions from 1.5 up to (excluding) 4.1.4 and versions from 4.2 up to (excluding) 4.2.2. The issue was discovered in April 2023 and patched with the release of versions 4.1.4 and 4.2.2 (GitHub Advisory).

Technical details

The vulnerability exists on ModelAdmin views within the Wagtail admin interface. Specifically, it affects two components: the 'Choose a parent page' ModelAdmin view (ChooseParentView) when managing pages via ModelAdmin, and the ModelAdmin Inspect view (InspectView) when displaying document fields. The issue stems from improper HTML escaping of user-controlled content in these views. The vulnerability has a CVSS v3.1 base score of 6.4 MEDIUM (Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H) (NVD).

Impact

A user with a limited-permission editor account for the Wagtail admin could potentially craft pages and documents that, when viewed by a user with higher privileges, could perform actions with that user's credentials. The vulnerability is not exploitable by ordinary site visitors without access to the Wagtail admin, and only affects sites with ModelAdmin enabled (GitHub Advisory).

Mitigation and workarounds

Patched versions have been released as Wagtail 4.1.4 and 4.2.2. For users unable to upgrade, several workarounds are available: For ChooseParentView, options include disabling ModelAdmin for all page models or providing a custom view via choose_parent_view_class with proper HTML escaping. For InspectView, solutions include removing inspect_view_enabled=True, using inspect_view_fields to prevent displaying document fields, or providing a custom view via inspect_view_class with proper escaping (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-21441HIGH8.9
  • PythonPython
  • urllib3
NoYesJan 07, 2026
CVE-2026-21851MEDIUM5.3
  • PythonPython
  • monai
NoNoJan 07, 2026
GHSA-f2mf-q878-gh58MEDIUM5.3
  • PythonPython
  • parsl
NoYesJan 06, 2026
CVE-2026-21883MEDIUM4.5
  • PythonPython
  • bokeh
NoYesJan 08, 2026
CVE-2026-22041LOW2
  • PythonPython
  • loggingredactor
NoYesJan 07, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management