Search for vulnerabilities
Vulnerability details: VCID-uhzz-jmby-aaar
Vulnerability ID VCID-uhzz-jmby-aaar
Aliases CVE-2013-4249
GHSA-4894-5vqc-6r2r
PYSEC-2013-19
Summary Cross-site scripting (XSS) vulnerability in the AdminURLFieldWidget widget in contrib/admin/widgets.py in Django 1.5.x before 1.5.2 and 1.6.x before 1.6 beta 2 allows remote attackers to inject arbitrary web script or HTML via a URLField.
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
epss 0.00095 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00316 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00316 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00316 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00316 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00316 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00316 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00316 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00316 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00316 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00316 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00316 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00316 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00368 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00368 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00368 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
epss 0.00368 https://api.first.org/data/v1/epss?cve=CVE-2013-4249
cvssv3.1 6.1 http://seclists.org/oss-sec/2013/q3/369
generic_textual MODERATE http://seclists.org/oss-sec/2013/q3/369
cvssv3.1 6.1 http://seclists.org/oss-sec/2013/q3/411
generic_textual MODERATE http://seclists.org/oss-sec/2013/q3/411
generic_textual MODERATE http://secunia.com/advisories/54476
cvssv3.1 6.1 https://exchange.xforce.ibmcloud.com/vulnerabilities/86438
generic_textual MODERATE https://exchange.xforce.ibmcloud.com/vulnerabilities/86438
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-4894-5vqc-6r2r
cvssv3.1 3.7 https://github.com/django/django
generic_textual MODERATE https://github.com/django/django
cvssv3.1 6.1 https://github.com/django/django/commit/90363e388c61874add3f3557ee654a996ec75d78
generic_textual MODERATE https://github.com/django/django/commit/90363e388c61874add3f3557ee654a996ec75d78
cvssv3.1 6.1 https://github.com/django/django/commit/cbe6d5568f4f5053ed7228ca3c3d0cce77cf9560
generic_textual MODERATE https://github.com/django/django/commit/cbe6d5568f4f5053ed7228ca3c3d0cce77cf9560
cvssv3.1 6.1 https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2013-19.yaml
generic_textual MODERATE https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2013-19.yaml
cvssv2 4.3 https://nvd.nist.gov/vuln/detail/CVE-2013-4249
cvssv3.1 6.1 https://web.archive.org/web/20201208180405/http://www.securitytracker.com/id/1028915
generic_textual MODERATE https://web.archive.org/web/20201208180405/http://www.securitytracker.com/id/1028915
cvssv3.1 6.1 https://www.djangoproject.com/weblog/2013/aug/13/security-releases-issued
generic_textual MODERATE https://www.djangoproject.com/weblog/2013/aug/13/security-releases-issued
generic_textual MODERATE http://www.securitytracker.com/id/1028915
Reference id Reference type URL
https://api.first.org/data/v1/epss?cve=CVE-2013-4249
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4249
http://seclists.org/oss-sec/2013/q3/369
http://seclists.org/oss-sec/2013/q3/411
http://secunia.com/advisories/54476
https://exchange.xforce.ibmcloud.com/vulnerabilities/86438
https://github.com/django/django
https://github.com/django/django/commit/90363e388c61874add3f3557ee654a996ec75d78
https://github.com/django/django/commit/cbe6d5568f4f5053ed7228ca3c3d0cce77cf9560
https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2013-19.yaml
https://web.archive.org/web/20201208180405/http://www.securitytracker.com/id/1028915
https://www.djangoproject.com/weblog/2013/aug/13/security-releases-issued
http://www.securitytracker.com/id/1028915
cpe:2.3:a:djangoproject:django:1.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.5:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.5.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.5.1:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.5:alpha:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.5:alpha:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.5:beta:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.5:beta:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:1.6:beta1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:1.6:beta1:*:*:*:*:*:*
CVE-2013-4249 https://nvd.nist.gov/vuln/detail/CVE-2013-4249
GHSA-4894-5vqc-6r2r https://github.com/advisories/GHSA-4894-5vqc-6r2r
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at http://seclists.org/oss-sec/2013/q3/369
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at http://seclists.org/oss-sec/2013/q3/411
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://exchange.xforce.ibmcloud.com/vulnerabilities/86438
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://github.com/django/django
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/django/django/commit/90363e388c61874add3f3557ee654a996ec75d78
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/django/django/commit/cbe6d5568f4f5053ed7228ca3c3d0cce77cf9560
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2013-19.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2013-4249
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://web.archive.org/web/20201208180405/http://www.securitytracker.com/id/1028915
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://www.djangoproject.com/weblog/2013/aug/13/security-releases-issued
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.1587
EPSS Score 0.00095
Published At March 29, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.