Vulnerabilities (CVE)

Filtered by vendor Jupo Subscribe
Filtered by product Mezzanine
Total 7 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2025-6050 1 Jupo 1 Mezzanine 2025-07-30 N/A 4.8 MEDIUM
Mezzanine CMS, in versions prior to 6.1.1, contains a Stored Cross-Site Scripting (XSS) vulnerability in the admin interface. The vulnerability exists in the "displayable_links_js" function, which fails to properly sanitize blog post titles before including them in JSON responses served via "/admin/displayable_links.js". An authenticated admin user can create a blog post with a malicious JavaScript payload in the title field, then trick another admin user into clicking a direct link to the "/admin/displayable_links.js" endpoint, causing the malicious script to execute in their browser.
CVE-2025-50481 1 Jupo 1 Mezzanine 2025-07-28 N/A 4.8 MEDIUM
A cross-site scripting (XSS) vulnerability in the component /blog/blogpost/add of Mezzanine CMS v6.1.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into a blog post.
CVE-2025-29573 1 Jupo 1 Mezzanine 2025-06-16 N/A 6.1 MEDIUM
Cross-Site Scripting (XSS) vulnerability exists in Mezzanine CMS 6.0.0 in the "View Entries" feature within the Forms module.
CVE-2024-25170 1 Jupo 1 Mezzanine 2025-04-28 N/A 9.1 CRITICAL
An issue in Mezzanine v6.0.0 allows attackers to bypass access controls via manipulating the Host header.
CVE-2024-25169 1 Jupo 1 Mezzanine 2025-03-28 N/A 9.8 CRITICAL
An issue in Mezzanine v6.0.0 allows attackers to bypass access control mechanisms in the admin panel via a crafted request.
CVE-2020-19002 1 Jupo 1 Mezzanine 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
Cross Site Scripting (XSS) in Mezzanine v4.3.1 allows remote attackers to execute arbitrary code via the 'Description' field of the component 'admin/blog/blogpost/add/'. This issue is different than CVE-2018-16632.
CVE-2018-16632 1 Jupo 1 Mezzanine 2024-11-21 3.5 LOW 4.8 MEDIUM
Mezzanine CMS v4.3.1 allows XSS via the /admin/blog/blogcategory/add/?_to_field=id&_popup=1 title parameter at admin/blog/blogpost/add/.