Mezzanine CMS has a Stored Cross-Site Scripting (XSS) vulnerability in the displayable_links_js function
        
  Moderate severity
        
          GitHub Reviewed
      
        Published
          Jun 17, 2025 
          to the GitHub Advisory Database
          •
          Updated Jul 15, 2025 
      
  
Description
        Published by the National Vulnerability Database
      Jun 17, 2025 
    
  
        Published to the GitHub Advisory Database
      Jun 17, 2025 
    
  
        Reviewed
      Jun 17, 2025 
    
  
        Last updated
      Jul 15, 2025 
    
  
Mezzanine CMS, in versions prior to 6.1.1, contains a Stored Cross-Site Scripting (XSS) vulnerability in the admin interface. The vulnerability exists in the "displayable_links_js" function, which fails to properly sanitize blog post titles before including them in JSON responses served via "/admin/displayable_links.js". An authenticated admin user can create a blog post with a malicious JavaScript payload in the title field, then trick another admin user into clicking a direct link to the "/admin/displayable_links.js" endpoint, causing the malicious script to execute in their browser.
References