Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. wagtail
  4. ›
  5. CVE-2024-32882

CVE-2024-32882: Wagtail has permission check bypass when editing a model with per-field restrictions through `wagtail.contrib.settings` or `ModelViewSet`

May 1, 2024

If a model has been made available for editing through the wagtail.contrib.settings module or ModelViewSet, and the permission argument on FieldPanel has been used to further restrict access to one or more fields of the model, a user with edit permission over the model but not the specific field can craft an HTTP POST request that bypasses the permission check on the individual field, allowing them to update its value.

The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin, or by a user who has not been granted edit access to the model in question. The editing interfaces for pages and snippets are also unaffected.

References

  • github.com/advisories/GHSA-w2v8-php4-p8hc
  • github.com/wagtail/wagtail
  • github.com/wagtail/wagtail/commit/fa0d4829f9c81eefb37cc058e2fa1b6a918741da
  • github.com/wagtail/wagtail/releases/tag/v6.0.3
  • github.com/wagtail/wagtail/security/advisories/GHSA-w2v8-php4-p8hc
  • nvd.nist.gov/vuln/detail/CVE-2024-32882

Code Behaviors & Features

Detect and mitigate CVE-2024-32882 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 6.0.0 before 6.0.3

Fixed versions

  • 6.0.3

Solution

Upgrade to version 6.0.3 or above.

Impact 2.7 LOW

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N

Learn more about CVSS

Source file

pypi/wagtail/CVE-2024-32882.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:55 +0000.