moin@1.9.10 vulnerabilities

MoinMoin 1.9.11 is an easy to use, full-featured and extensible wiki software package

Direct Vulnerabilities

Known vulnerabilities in the moin package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Remote Code Execution (RCE)

Affected versions of this package are vulnerable to Remote Code Execution (RCE). The cache action in action/cache.py allows directory traversal through a crafted HTTP request. An attacker who can upload attachments to the wiki can use this to achieve remote code execution.

How to fix Remote Code Execution (RCE)?

Upgrade moin to version 1.9.11 or higher.

[,1.9.11)
  • M
Cross-site Scripting (XSS)

Affected versions of this package are vulnerable to Cross-site Scripting (XSS). An attacker with write permissions can upload an SVG file that contains malicious javascript. This javascript will be executed in a user's browser when the user is viewing that SVG file on the wiki.

How to fix Cross-site Scripting (XSS)?

Upgrade moin to version 1.9.11 or higher.

[,1.9.11)