Skip to content

Merge pull request #5316 from rtibbles/images_in_qti

d16d580
Select commit
Loading
Failed to load commit list.
Merged

Hotfixes release v2025.08.14 #5300

Merge pull request #5316 from rtibbles/images_in_qti
d16d580
Select commit
Loading
Failed to load commit list.
GitHub Advanced Security / CodeQL failed Aug 22, 2025 in 3s

40 new alerts including 1 high severity security vulnerability

New alerts in code changed by this pull request

Security Alerts:

  • 1 high
  • 39 medium

Alerts not introduced by this pull request might have been detected because the code changes were too large.

See annotations below for details.

View all branch alerts.

Annotations

Check warning on line 14 in .github/workflows/call-contributor-issue-comment.yml

See this annotation in the file changed.

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {}

Check warning on line 13 in .github/workflows/call-manage-issue-header.yml

See this annotation in the file changed.

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {}

Check warning on line 12 in .github/workflows/community-contribution-labeling.yml

See this annotation in the file changed.

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {}

Check warning on line 28 in .github/workflows/pre-commit.yml

See this annotation in the file changed.

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {}

Check warning on line 52 in .github/workflows/pre-commit.yml

See this annotation in the file changed.

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {contents: read}

Check warning on line 15 in .github/workflows/unassign-inactive.yaml

See this annotation in the file changed.

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {}

Check warning on line 12 in .github/workflows/update-pr-spreadsheet.yml

See this annotation in the file changed.

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {}

Check failure on line 49 in contentcuration/contentcuration/utils/db_tools.py

See this annotation in the file changed.

Code scanning / CodeQL

Clear-text logging of sensitive information High

This expression logs
sensitive data (password)
as clear text.
This expression logs
sensitive data (password)
as clear text.

Check warning on line 90 in contentcuration/contentcuration/utils/pagination.py

See this annotation in the file changed.

Code scanning / CodeQL

Information exposure through an exception Medium

Stack trace information
flows to this location and may be exposed to an external user.

Check warning on line 109 in contentcuration/contentcuration/views/base.py

See this annotation in the file changed.

Code scanning / CodeQL

Reflected server-side cross-site scripting Medium

Cross-site scripting vulnerability due to a
user-provided value
.

Check warning on line 404 in contentcuration/contentcuration/views/base.py

See this annotation in the file changed.

Code scanning / CodeQL

Reflected server-side cross-site scripting Medium

Cross-site scripting vulnerability due to a
user-provided value
.

Check warning on line 140 in contentcuration/contentcuration/views/internal.py

See this annotation in the file changed.

Code scanning / CodeQL

Information exposure through an exception Medium

Stack trace information
flows to this location and may be exposed to an external user.

Check warning on line 165 in contentcuration/contentcuration/views/internal.py

See this annotation in the file changed.

Code scanning / CodeQL

Information exposure through an exception Medium

Stack trace information
flows to this location and may be exposed to an external user.

Check warning on line 182 in contentcuration/contentcuration/views/internal.py

See this annotation in the file changed.

Code scanning / CodeQL

Information exposure through an exception Medium

Stack trace information
flows to this location and may be exposed to an external user.

Check warning on line 187 in contentcuration/contentcuration/views/internal.py

See this annotation in the file changed.

Code scanning / CodeQL

Information exposure through an exception Medium

Stack trace information
flows to this location and may be exposed to an external user.

Check warning on line 198 in contentcuration/contentcuration/views/internal.py

See this annotation in the file changed.

Code scanning / CodeQL

Information exposure through an exception Medium

Stack trace information
flows to this location and may be exposed to an external user.

Check warning on line 226 in contentcuration/contentcuration/views/internal.py

See this annotation in the file changed.

Code scanning / CodeQL

Information exposure through an exception Medium

Stack trace information
flows to this location and may be exposed to an external user.

Check warning on line 230 in contentcuration/contentcuration/views/internal.py

See this annotation in the file changed.

Code scanning / CodeQL

Information exposure through an exception Medium

Stack trace information
flows to this location and may be exposed to an external user.

Check warning on line 296 in contentcuration/contentcuration/views/internal.py

See this annotation in the file changed.

Code scanning / CodeQL

Reflected server-side cross-site scripting Medium

Cross-site scripting vulnerability due to a
user-provided value
.

Check warning on line 299 in contentcuration/contentcuration/views/internal.py

See this annotation in the file changed.

Code scanning / CodeQL

Information exposure through an exception Medium

Stack trace information
flows to this location and may be exposed to an external user.

Check warning on line 303 in contentcuration/contentcuration/views/internal.py

See this annotation in the file changed.

Code scanning / CodeQL

Information exposure through an exception Medium

Stack trace information
flows to this location and may be exposed to an external user.

Check warning on line 351 in contentcuration/contentcuration/views/internal.py

See this annotation in the file changed.

Code scanning / CodeQL

Reflected server-side cross-site scripting Medium

Cross-site scripting vulnerability due to a
user-provided value
.

Check warning on line 353 in contentcuration/contentcuration/views/internal.py

See this annotation in the file changed.

Code scanning / CodeQL

Information exposure through an exception Medium

Stack trace information
flows to this location and may be exposed to an external user.

Check warning on line 356 in contentcuration/contentcuration/views/internal.py

See this annotation in the file changed.

Code scanning / CodeQL

Information exposure through an exception Medium

Stack trace information
flows to this location and may be exposed to an external user.

Check warning on line 359 in contentcuration/contentcuration/views/internal.py

See this annotation in the file changed.

Code scanning / CodeQL

Information exposure through an exception Medium

Stack trace information
flows to this location and may be exposed to an external user.