CVE-2024-11406
Python vulnerability analysis and mitigation

Overview

A Stored Cross-Site Scripting (XSS) vulnerability was discovered in django CMS Attributes Fields affecting versions before 4.0. The vulnerability (CVE-2024-11406) exists because the application did not properly validate attributes when validating the form field, although it did validate them in the model field. This security issue specifically affects applications using the form field, such as django CMS Frontend (Django CMS Blog).

Technical details

The vulnerability resides in the Django CMS admin panel under the Page Editing interface, specifically when utilizing the 'Add plugin to placeholder Page Content' feature. The issue occurs when editing page content, where plugins such as 'card' and 'badge' allow injection of unsanitized input in the 'Advanced settings' section. The vulnerability has been assigned a CVSS v3.1 Base Score of 6.9 (Medium) with vector string CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:N (ILTOSEC Blog).

Impact

The vulnerability allows malicious actors to inject and store XSS payloads through the attributes field, which could be executed when other users access the affected content. This could lead to potential compromise of user data and unauthorized actions within the application (Django CMS Blog).

Mitigation and workarounds

The vulnerability has been fixed in django CMS Attributes Field version 4.0. The update includes validation for form fields and by default disallows attributes that can execute JavaScript. The fix has been implemented through a patch that adds form field validation and introduces default excluded keys such as 'src', 'href', 'data', 'action', and 'on*' to prevent JavaScript execution. Users are strongly recommended to upgrade to version 4.0 (Django CMS Blog).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22871HIGH8.7
  • PythonPython
  • guarddog
NoYesJan 13, 2026
GHSA-58pv-8j8x-9vj2HIGH8.6
  • PythonPython
  • jaraco.context
NoYesJan 13, 2026
CVE-2026-22779MEDIUM6.3
  • PythonPython
  • blacksheep
NoYesJan 14, 2026
CVE-2026-21889LOW2.3
  • PythonPython
  • weblate
NoYesJan 14, 2026
CVE-2025-68492LOW2.3
  • PythonPython
  • chainlit
NoYesJan 14, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management