Description
CKAN is an open-source DMS (data management system) for powering data hubs and data portals. Prior to 2.10.9 and 2.11.4, the helpers.markdown_extract() function did not perform sufficient sanitization of input data before wrapping in an HTML literal element. This helper is used to render user-provided data on dataset, resource, organization or group pages (plus any page provided by an extension that used that helper function), leading to a potential XSS vector. This vulnerability has been fixed in CKAN 2.10.9 and 2.11.4.
References (2)
Core 2
Core References
Vendor Advisory x_refsource_confirm
https://github.com/ckan/ckan/security/advisories/GHSA-2r4h-8jxv-w2j8
Patch x_refsource_misc
https://github.com/ckan/ckan/commit/6d0065f2fc7e2682196d125275af34b93e9e554e
Scores
CVSS v3
6.3
EPSS
0.0003
EPSS Percentile
7.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-79
Status
published
Products (3)
ckan/ckan
< 2.10.9
ckan/ckan
>= 2.11.0, < 2.11.4
pypi/ckan
2.11.0 - 2.11.4PyPI
Published
Oct 29, 2025
Tracked Since
Feb 18, 2026