CVE-2019-16766

Source
https://nvd.nist.gov/vuln/detail/CVE-2019-16766
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-16766.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2019-16766
Aliases
Related
Published
2019-11-29T17:15:11.683Z
Modified
2025-11-14T09:21:12.054586Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

When using wagtail-2fa before 1.3.0, if someone gains access to someone's Wagtail login credentials, they can log into the CMS and bypass the 2FA check by changing the URL. They can then add a new device and gain full access to the CMS. This problem has been patched in version 1.3.0.

References

Affected packages

Git / github.com/labd/wagtail-2fa

Affected ranges

Type
GIT
Repo
https://github.com/labd/wagtail-2fa
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

0.*

0.0.1
0.0.2
0.0.3
0.1.0

1.*

1.0.0
1.0.1
1.1.0
1.2.0