Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2023-28837

Summary
Assigner-GitHub_M
Assigner Org ID-a0819718-46f1-4df5-94e2-005712e83aaa
Published At-03 Apr, 2023 | 16:41
Updated At-11 Feb, 2025 | 14:37
Rejected At-
Credits

Wagtail vulnerable to denial-of-service via memory exhaustion when uploading large files

Wagtail is an open source content management system built on Django. Prior to versions 4.1.4 and 4.2.2, a memory exhaustion bug exists in Wagtail's handling of uploaded images and documents. For both images and documents, files are loaded into memory during upload for additional processing. A user with access to upload images or documents through the Wagtail admin interface could upload a file so large that it results in a crash of denial of service. The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin. It can only be exploited by admin users with permission to upload images or documents. Image uploads are restricted to 10MB by default, however this validation only happens on the frontend and on the backend after the vulnerable code. Patched versions have been released as Wagtail 4.1.4 and Wagtail 4.2.2). Site owners who are unable to upgrade to the new versions are encouraged to add extra protections outside of Wagtail to limit the size of uploaded files.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:GitHub_M
Assigner Org ID:a0819718-46f1-4df5-94e2-005712e83aaa
Published At:03 Apr, 2023 | 16:41
Updated At:11 Feb, 2025 | 14:37
Rejected At:
▼CVE Numbering Authority (CNA)
Wagtail vulnerable to denial-of-service via memory exhaustion when uploading large files

Wagtail is an open source content management system built on Django. Prior to versions 4.1.4 and 4.2.2, a memory exhaustion bug exists in Wagtail's handling of uploaded images and documents. For both images and documents, files are loaded into memory during upload for additional processing. A user with access to upload images or documents through the Wagtail admin interface could upload a file so large that it results in a crash of denial of service. The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin. It can only be exploited by admin users with permission to upload images or documents. Image uploads are restricted to 10MB by default, however this validation only happens on the frontend and on the backend after the vulnerable code. Patched versions have been released as Wagtail 4.1.4 and Wagtail 4.2.2). Site owners who are unable to upgrade to the new versions are encouraged to add extra protections outside of Wagtail to limit the size of uploaded files.

Affected Products
Vendor
wagtail
Product
wagtail
Versions
Affected
  • < 4.1.4
  • >= 4.2, < 4.2.2
Problem Types
TypeCWE IDDescription
CWECWE-400CWE-400: Uncontrolled Resource Consumption
CWECWE-770CWE-770: Allocation of Resources Without Limits or Throttling
Type: CWE
CWE ID: CWE-400
Description: CWE-400: Uncontrolled Resource Consumption
Type: CWE
CWE ID: CWE-770
Description: CWE-770: Allocation of Resources Without Limits or Throttling
Metrics
VersionBase scoreBase severityVector
3.14.9MEDIUM
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Version: 3.1
Base score: 4.9
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/wagtail/wagtail/security/advisories/GHSA-33pv-vcgh-jfg9
x_refsource_CONFIRM
https://github.com/wagtail/wagtail/commit/3c0c64642b9e5b8d28b111263c7f4bddad6c3880
x_refsource_MISC
https://github.com/wagtail/wagtail/commit/c9d2fcd650a88d76ae122646142245e5927a9165
x_refsource_MISC
https://github.com/wagtail/wagtail/commit/cfa11bbe00dbe7ce8cd4c0bbfe2a898a690df2bf
x_refsource_MISC
https://github.com/wagtail/wagtail/commit/d4022310cbe497993459c3136311467c7ac6329a
x_refsource_MISC
https://docs.wagtail.org/en/stable/reference/settings.html#wagtailimages-max-upload-size
x_refsource_MISC
https://github.com/wagtail/wagtail/releases/tag/v4.1.4
x_refsource_MISC
https://github.com/wagtail/wagtail/releases/tag/v4.2.2
x_refsource_MISC
Hyperlink: https://github.com/wagtail/wagtail/security/advisories/GHSA-33pv-vcgh-jfg9
Resource:
x_refsource_CONFIRM
Hyperlink: https://github.com/wagtail/wagtail/commit/3c0c64642b9e5b8d28b111263c7f4bddad6c3880
Resource:
x_refsource_MISC
Hyperlink: https://github.com/wagtail/wagtail/commit/c9d2fcd650a88d76ae122646142245e5927a9165
Resource:
x_refsource_MISC
Hyperlink: https://github.com/wagtail/wagtail/commit/cfa11bbe00dbe7ce8cd4c0bbfe2a898a690df2bf
Resource:
x_refsource_MISC
Hyperlink: https://github.com/wagtail/wagtail/commit/d4022310cbe497993459c3136311467c7ac6329a
Resource:
x_refsource_MISC
Hyperlink: https://docs.wagtail.org/en/stable/reference/settings.html#wagtailimages-max-upload-size
Resource:
x_refsource_MISC
Hyperlink: https://github.com/wagtail/wagtail/releases/tag/v4.1.4
Resource:
x_refsource_MISC
Hyperlink: https://github.com/wagtail/wagtail/releases/tag/v4.2.2
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/wagtail/wagtail/security/advisories/GHSA-33pv-vcgh-jfg9
x_refsource_CONFIRM
x_transferred
https://github.com/wagtail/wagtail/commit/3c0c64642b9e5b8d28b111263c7f4bddad6c3880
x_refsource_MISC
x_transferred
https://github.com/wagtail/wagtail/commit/c9d2fcd650a88d76ae122646142245e5927a9165
x_refsource_MISC
x_transferred
https://github.com/wagtail/wagtail/commit/cfa11bbe00dbe7ce8cd4c0bbfe2a898a690df2bf
x_refsource_MISC
x_transferred
https://github.com/wagtail/wagtail/commit/d4022310cbe497993459c3136311467c7ac6329a
x_refsource_MISC
x_transferred
https://docs.wagtail.org/en/stable/reference/settings.html#wagtailimages-max-upload-size
x_refsource_MISC
x_transferred
https://github.com/wagtail/wagtail/releases/tag/v4.1.4
x_refsource_MISC
x_transferred
https://github.com/wagtail/wagtail/releases/tag/v4.2.2
x_refsource_MISC
x_transferred
Hyperlink: https://github.com/wagtail/wagtail/security/advisories/GHSA-33pv-vcgh-jfg9
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://github.com/wagtail/wagtail/commit/3c0c64642b9e5b8d28b111263c7f4bddad6c3880
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://github.com/wagtail/wagtail/commit/c9d2fcd650a88d76ae122646142245e5927a9165
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://github.com/wagtail/wagtail/commit/cfa11bbe00dbe7ce8cd4c0bbfe2a898a690df2bf
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://github.com/wagtail/wagtail/commit/d4022310cbe497993459c3136311467c7ac6329a
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://docs.wagtail.org/en/stable/reference/settings.html#wagtailimages-max-upload-size
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://github.com/wagtail/wagtail/releases/tag/v4.1.4
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://github.com/wagtail/wagtail/releases/tag/v4.2.2
Resource:
x_refsource_MISC
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security-advisories@github.com
Published At:03 Apr, 2023 | 17:15
Updated At:07 Nov, 2023 | 04:10

Wagtail is an open source content management system built on Django. Prior to versions 4.1.4 and 4.2.2, a memory exhaustion bug exists in Wagtail's handling of uploaded images and documents. For both images and documents, files are loaded into memory during upload for additional processing. A user with access to upload images or documents through the Wagtail admin interface could upload a file so large that it results in a crash of denial of service. The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin. It can only be exploited by admin users with permission to upload images or documents. Image uploads are restricted to 10MB by default, however this validation only happens on the frontend and on the backend after the vulnerable code. Patched versions have been released as Wagtail 4.1.4 and Wagtail 4.2.2). Site owners who are unable to upgrade to the new versions are encouraged to add extra protections outside of Wagtail to limit the size of uploaded files.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.14.9MEDIUM
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Secondary3.14.9MEDIUM
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Type: Primary
Version: 3.1
Base score: 4.9
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Type: Secondary
Version: 3.1
Base score: 4.9
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
CPE Matches

torchbox
torchbox
>>wagtail>>Versions before 4.1.4(exclusive)
cpe:2.3:a:torchbox:wagtail:*:*:*:*:*:*:*:*
torchbox
torchbox
>>wagtail>>Versions from 4.2(inclusive) to 4.2.2(exclusive)
cpe:2.3:a:torchbox:wagtail:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-400Primarysecurity-advisories@github.com
CWE-770Primarysecurity-advisories@github.com
CWE ID: CWE-400
Type: Primary
Source: security-advisories@github.com
CWE ID: CWE-770
Type: Primary
Source: security-advisories@github.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://docs.wagtail.org/en/stable/reference/settings.html#wagtailimages-max-upload-sizesecurity-advisories@github.com
Product
https://github.com/wagtail/wagtail/commit/3c0c64642b9e5b8d28b111263c7f4bddad6c3880security-advisories@github.com
Patch
https://github.com/wagtail/wagtail/commit/c9d2fcd650a88d76ae122646142245e5927a9165security-advisories@github.com
Release Notes
https://github.com/wagtail/wagtail/commit/cfa11bbe00dbe7ce8cd4c0bbfe2a898a690df2bfsecurity-advisories@github.com
Patch
https://github.com/wagtail/wagtail/commit/d4022310cbe497993459c3136311467c7ac6329asecurity-advisories@github.com
Release Notes
https://github.com/wagtail/wagtail/releases/tag/v4.1.4security-advisories@github.com
Release Notes
https://github.com/wagtail/wagtail/releases/tag/v4.2.2security-advisories@github.com
Release Notes
https://github.com/wagtail/wagtail/security/advisories/GHSA-33pv-vcgh-jfg9security-advisories@github.com
Mitigation
Vendor Advisory
Hyperlink: https://docs.wagtail.org/en/stable/reference/settings.html#wagtailimages-max-upload-size
Source: security-advisories@github.com
Resource:
Product
Hyperlink: https://github.com/wagtail/wagtail/commit/3c0c64642b9e5b8d28b111263c7f4bddad6c3880
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/wagtail/wagtail/commit/c9d2fcd650a88d76ae122646142245e5927a9165
Source: security-advisories@github.com
Resource:
Release Notes
Hyperlink: https://github.com/wagtail/wagtail/commit/cfa11bbe00dbe7ce8cd4c0bbfe2a898a690df2bf
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/wagtail/wagtail/commit/d4022310cbe497993459c3136311467c7ac6329a
Source: security-advisories@github.com
Resource:
Release Notes
Hyperlink: https://github.com/wagtail/wagtail/releases/tag/v4.1.4
Source: security-advisories@github.com
Resource:
Release Notes
Hyperlink: https://github.com/wagtail/wagtail/releases/tag/v4.2.2
Source: security-advisories@github.com
Resource:
Release Notes
Hyperlink: https://github.com/wagtail/wagtail/security/advisories/GHSA-33pv-vcgh-jfg9
Source: security-advisories@github.com
Resource:
Mitigation
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

103Records found

CVE-2024-20976
Matching Score-4
Assigner-Oracle
ShareView Details
Matching Score-4
Assigner-Oracle
CVSS Score-4.9||MEDIUM
EPSS-0.27% / 50.10%
||
7 Day CHG~0.00%
Published-17 Feb, 2024 | 01:50
Updated-26 Aug, 2025 | 20:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.35 and prior and 8.2.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

Action-Not Available
Vendor-Oracle Corporation
Product-mysql_serverMySQL Server
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2024-20972
Matching Score-4
Assigner-Oracle
ShareView Details
Matching Score-4
Assigner-Oracle
CVSS Score-4.9||MEDIUM
EPSS-0.22% / 44.37%
||
7 Day CHG~0.00%
Published-17 Feb, 2024 | 01:50
Updated-29 Mar, 2025 | 00:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.35 and prior and 8.2.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

Action-Not Available
Vendor-Oracle Corporation
Product-mysql_serverMySQL Server
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2022-36326
Matching Score-4
Assigner-Western Digital
ShareView Details
Matching Score-4
Assigner-Western Digital
CVSS Score-4.4||MEDIUM
EPSS-0.11% / 29.97%
||
7 Day CHG~0.00%
Published-18 May, 2023 | 17:53
Updated-22 Jan, 2025 | 14:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Resource Exhaustion Vulnerability in Western Digital devices

An uncontrolled resource consumption vulnerability issue that could arise by sending crafted requests to a service to consume a large amount of memory, eventually resulting in the service being stopped and restarted was discovered in Western Digital My Cloud Home, My Cloud Home Duo, SanDisk ibi and Western Digital My Cloud OS 5 devices. This issue requires the attacker to already have root privileges in order to exploit this vulnerability.This issue affects My Cloud Home and My Cloud Home Duo: before 9.4.0-191; ibi: before 9.4.0-191; My Cloud OS 5: before 5.26.202.

Action-Not Available
Vendor-Western Digital Corp.Sandisk Corp.
Product-my_cloud_os_5my_cloud_homemy_cloud_home_firmwaremy_cloud_home_duomy_cloud_pr4100sandisk_ibi_firmwaremy_cloud_dl2100sandisk_ibiwd_cloudmy_cloudmy_cloud_ex4100my_cloud_ex2_ultramy_cloud_mirror_g2my_cloud_pr2100my_cloud_dl4100my_cloud_ex2100my_cloud_home_duo_firmwareMy Cloud OS 5My Cloud Home and My Cloud Home Duoibi
CWE ID-CWE-400
Uncontrolled Resource Consumption
  • Previous
  • 1
  • 2
  • 3
  • Next
Details not found