CVE-2023-45809
Python vulnerability analysis and mitigation

Overview

A vulnerability was discovered in Wagtail, an open source content management system built on Django, identified as CVE-2023-45809. The vulnerability allows users with limited-permission editor accounts to access display names of user accounts through the admin bulk action views. This security issue was disclosed on October 19, 2023, affecting Wagtail versions <4.1.9, 4.2-5.0.4, and 5.1-5.1.2 (Vendor Advisory).

Technical details

The vulnerability occurs when a user with limited permissions makes a direct URL request to the admin view that handles bulk actions on user accounts. While the authentication rules prevent unauthorized changes, the error message inadvertently discloses user account display names. By manipulating URL parameters, an attacker can retrieve display names for any user in the system. The vulnerability has been assigned a CVSS v3.1 base score of 2.7 (LOW) with the vector string CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N (Vendor Advisory).

Impact

The impact of this vulnerability is limited to information disclosure, specifically the display names of user accounts. The vulnerability only affects users who have access to the Wagtail admin interface and cannot be exploited by ordinary site visitors without admin access (Vendor Advisory).

Mitigation and workarounds

Patched versions have been released as Wagtail 4.1.9 (LTS), 5.0.5, and 5.1.3. The fix is also included in Release Candidate 1 of the forthcoming Wagtail 5.2 release. There are no known workarounds for this vulnerability, and users are advised to upgrade to the patched versions (Vendor Advisory).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-66423HIGH7.1
  • PythonPython
  • tryton-server
NoYesNov 30, 2025
CVE-2025-66454MEDIUM6.5
  • PythonPython
  • arcade-mcp-server
NoYesDec 02, 2025
CVE-2025-66424MEDIUM6.5
  • PythonPython
  • trytond
NoYesNov 30, 2025
CVE-2025-66422MEDIUM4.3
  • PythonPython
  • tryton-server
NoYesNov 30, 2025
CVE-2025-65858LOW3.5
  • PythonPython
  • calibreweb
NoNoDec 02, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management