GHSA-XFVG-8V67-J7WP
Vulnerability from github – Published: 2026-02-25 16:06 – Updated: 2026-02-25 16:06I. Summary
A Stored Cross-Site Scripting (XSS) vulnerability exists in the file upload module of TypiCMS. The application allows users with file upload permissions to upload SVG files. While there is a MIME type validation, the content of the SVG file is not sanitized. An attacker can upload a specially crafted SVG file containing malicious JavaScript code. When another user (such as an administrator) views or accesses this file through the application, the script executes in their browser, leading to a compromise of that user's session.
The issue is exacerbated by a bug in the SVG parsing logic, which can cause a 500 error if the uploaded SVG does not contain a viewBox attribute. However, this does not mitigate the XSS vulnerability, as an attacker can easily include a valid viewBox attribute in their malicious payload.
II. Vulnerability Details
- Vulnerability Type: Stored Cross-Site Scripting (XSS) (CWE-79)
- Affected Component:
TypiCMS\Modules\Core\Http\Requests\FileFormRequest.phpandTypiCMS\Modules\Core\Services\FileUploader.php. - Affected Versions: <= 16.0.5
The vulnerability stems from two main points:
- Permissive File Validation: The
FileFormRequestexplicitly whitelistssvgas an allowed MIME type for uploads. - Lack of Content Sanitization: The
FileUploaderservice saves the SVG file to the server without parsing and sanitizing its content to remove potentially malicious elements like<script>tags oron*event handlers.
When the default filesystem disk is set to public, the uploaded SVG file is stored in a publicly accessible directory, making it trivial to access the file via a direct URL and trigger the XSS payload.
III. Proof of Concept (PoC)
-
Create a Malicious SVG File: Create a file named
malicious.svgwith the following content. TheviewBoxattribute is included to bypass the application's parsing bug.xml <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"> <script> // A simple PoC to demonstrate the vulnerability alert('XSS in TypiCMS! Your session cookie is: ' + document.cookie); </script> <text x="10" y="50">If you see this, the script has run.</text> </svg> -
Upload the Malicious File:
- Log in to the TypiCMS admin panel as a user with permissions to upload files.
- Navigate to the "Files" module (e.g.,
/admin/files). - Upload the
malicious.svgfile. The application will accept the file and store it.
-
Trigger the XSS:
- The application will provide a public URL for the uploaded file, typically in the format
http://<your-site>/storage/files/malicious.svg. - Anyone who navigates to this URL will have the embedded JavaScript executed in their browser.
- An attacker can send this link to a privileged user (e.g., an administrator). When the administrator clicks the link, their session cookies can be stolen, or the attacker can perform actions on their behalf.
- The application will provide a public URL for the uploaded file, typically in the format
IV. Impact
Successful exploitation of this vulnerability allows an attacker to execute arbitrary JavaScript in the context of the victim's browser. Although the use of the HttpOnly flag on session cookies prevents direct theft of the session ID via document.cookie, the attacker can still achieve a full compromise of the victim's account by performing actions on their behalf.
The impact includes:
-
Account Takeover via Action Forgery: The attacker's script can make authenticated requests to the application's API from the victim's browser. This allows the attacker to perform any action the victim is authorized to do, such as:
- Creating a new administrator account for the attacker.
- Changing the victim's email address and password.
- Deleting or modifying all content, users, and settings.
-
Sensitive Information Disclosure: The script can read the content of any page the victim views within the admin panel. This includes lists of users (with names and emails), private application settings, and other sensitive data, which can then be exfiltrated to an attacker-controlled server.
-
Phishing and Social Engineering: The script can manipulate the admin panel's UI to display fake login forms to trick the user into re-entering their credentials, or redirect them to a malicious website.
-
Keystroke Logging: The script can capture any information the victim types into forms on the compromised page.
Because the attacker can perform any action as an authenticated administrator, this vulnerability effectively leads to a full application compromise, even without direct access to the session cookie. The risk is High.
V. Recommended Patches and Mitigations
It is recommended to apply a defense-in-depth approach to mitigate this vulnerability.
-
Primary Fix: Sanitize SVG Content: The most robust solution is to sanitize SVG files upon upload. Before saving the file, it should be parsed to remove all potentially dangerous elements, including
<script>,<style>,<foreignObject>tags, and allon*event attributes. This can be achieved using a dedicated SVG sanitization library. -
Secondary Fix: Disable SVG Uploads: If SVG uploads are not a critical feature for the application, the simplest and most secure solution is to disable them entirely. This can be done by removing
'svg'from the list of allowed MIME types inTypiCMS\Modules\Core\Http\Requests\FileFormRequest.php.```php // In FileFormRequest.php // BEFORE: $fileRule = 'mimes:jpeg,gif,png,...,svg,...|max:...';
// AFTER: $fileRule = 'mimes:jpeg,gif,png,...,pdf,...|max:...'; // Removed 'svg' ```
-
Hardening - Content-Security-Policy (CSP): Implement a strict Content-Security-Policy (CSP) header for the application. A well-configured CSP can prevent the execution of inline scripts, which would mitigate the impact of this XSS vulnerability.
-
Hardening - Serve User Content from a Separate Domain: Serve all user-uploaded files from a separate, cookie-less domain. This is a highly effective security measure that isolates user-generated content from the main application, preventing scripts from accessing session cookies or interacting with the application's DOM.
{
"affected": [
{
"package": {
"ecosystem": "Packagist",
"name": "typicms/core"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "16.1.7"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2026-27621"
],
"database_specific": {
"cwe_ids": [
"CWE-79"
],
"github_reviewed": true,
"github_reviewed_at": "2026-02-25T16:06:59Z",
"nvd_published_at": "2026-02-25T03:16:06Z",
"severity": "MODERATE"
},
"details": "#### I. Summary\n\nA Stored Cross-Site Scripting (XSS) vulnerability exists in the file upload module of TypiCMS. The application allows users with file upload permissions to upload SVG files. While there is a MIME type validation, the content of the SVG file is not sanitized. An attacker can upload a specially crafted SVG file containing malicious JavaScript code. When another user (such as an administrator) views or accesses this file through the application, the script executes in their browser, leading to a compromise of that user\u0027s session.\n\nThe issue is exacerbated by a bug in the SVG parsing logic, which can cause a 500 error if the uploaded SVG does not contain a `viewBox` attribute. However, this does not mitigate the XSS vulnerability, as an attacker can easily include a valid `viewBox` attribute in their malicious payload.\n\n#### II. Vulnerability Details\n\n* **Vulnerability Type:** Stored Cross-Site Scripting (XSS) (CWE-79)\n* **Affected Component:** `TypiCMS\\Modules\\Core\\Http\\Requests\\FileFormRequest.php` and `TypiCMS\\Modules\\Core\\Services\\FileUploader.php`.\n* **Affected Versions:** \u003c= 16.0.5\n\nThe vulnerability stems from two main points:\n\n1. **Permissive File Validation:** The `FileFormRequest` explicitly whitelists `svg` as an allowed MIME type for uploads.\n2. **Lack of Content Sanitization:** The `FileUploader` service saves the SVG file to the server without parsing and sanitizing its content to remove potentially malicious elements like `\u003cscript\u003e` tags or `on*` event handlers.\n\nWhen the default filesystem disk is set to `public`, the uploaded SVG file is stored in a publicly accessible directory, making it trivial to access the file via a direct URL and trigger the XSS payload.\n\n#### III. Proof of Concept (PoC)\n\n1. **Create a Malicious SVG File:**\n Create a file named `malicious.svg` with the following content. The `viewBox` attribute is included to bypass the application\u0027s parsing bug.\n\n ```xml\n \u003csvg xmlns=\"http://www.w3.org/2000/svg\" viewBox=\"0 0 100 100\"\u003e\n \u003cscript\u003e\n // A simple PoC to demonstrate the vulnerability\n alert(\u0027XSS in TypiCMS! Your session cookie is: \u0027 + document.cookie);\n \u003c/script\u003e\n \u003ctext x=\"10\" y=\"50\"\u003eIf you see this, the script has run.\u003c/text\u003e\n \u003c/svg\u003e\n ```\n\n2. **Upload the Malicious File:**\n * Log in to the TypiCMS admin panel as a user with permissions to upload files.\n * Navigate to the \"Files\" module (e.g., `/admin/files`).\n * Upload the `malicious.svg` file. The application will accept the file and store it.\n\u003cimg width=\"2540\" height=\"1217\" alt=\"image\" src=\"https://github.com/user-attachments/assets/beb8ace9-ac39-442c-a2bc-3fbfb09f8c32\" /\u003e\n\u003cimg width=\"1718\" height=\"671\" alt=\"image\" src=\"https://github.com/user-attachments/assets/9cd4a3f8-28e3-4223-8203-7ab292eaf95f\" /\u003e\n\n3. **Trigger the XSS:**\n * The application will provide a public URL for the uploaded file, typically in the format `http://\u003cyour-site\u003e/storage/files/malicious.svg`.\n * Anyone who navigates to this URL will have the embedded JavaScript executed in their browser.\n * An attacker can send this link to a privileged user (e.g., an administrator). When the administrator clicks the link, their session cookies can be stolen, or the attacker can perform actions on their behalf.\n \n\u003cimg width=\"2091\" height=\"704\" alt=\"image\" src=\"https://github.com/user-attachments/assets/99c915bb-a518-46aa-b237-390cd58f34e7\" /\u003e\n\u003cimg width=\"1457\" height=\"996\" alt=\"image\" src=\"https://github.com/user-attachments/assets/0ed000ec-78cf-4ed8-8cd5-2886fbb2afc0\" /\u003e\n\n\n#### IV. Impact\n\nSuccessful exploitation of this vulnerability allows an attacker to execute arbitrary JavaScript in the context of the victim\u0027s browser. Although the use of the `HttpOnly` flag on session cookies prevents direct theft of the session ID via `document.cookie`, the attacker can still achieve a full compromise of the victim\u0027s account by performing actions on their behalf.\n\nThe impact includes:\n\n* **Account Takeover via Action Forgery:** The attacker\u0027s script can make authenticated requests to the application\u0027s API from the victim\u0027s browser. This allows the attacker to perform any action the victim is authorized to do, such as:\n * Creating a new administrator account for the attacker.\n * Changing the victim\u0027s email address and password.\n * Deleting or modifying all content, users, and settings.\n\n* **Sensitive Information Disclosure:** The script can read the content of any page the victim views within the admin panel. This includes lists of users (with names and emails), private application settings, and other sensitive data, which can then be exfiltrated to an attacker-controlled server.\n\n* **Phishing and Social Engineering:** The script can manipulate the admin panel\u0027s UI to display fake login forms to trick the user into re-entering their credentials, or redirect them to a malicious website.\n\n* **Keystroke Logging:** The script can capture any information the victim types into forms on the compromised page.\n\nBecause the attacker can perform any action as an authenticated administrator, this vulnerability effectively leads to a **full application compromise**, even without direct access to the session cookie. The risk is **High**.\n\n\n#### V. Recommended Patches and Mitigations\n\nIt is recommended to apply a defense-in-depth approach to mitigate this vulnerability.\n\n1. **Primary Fix: Sanitize SVG Content:**\n The most robust solution is to sanitize SVG files upon upload. Before saving the file, it should be parsed to remove all potentially dangerous elements, including `\u003cscript\u003e`, `\u003cstyle\u003e`, `\u003cforeignObject\u003e` tags, and all `on*` event attributes. This can be achieved using a dedicated SVG sanitization library.\n\n2. **Secondary Fix: Disable SVG Uploads:**\n If SVG uploads are not a critical feature for the application, the simplest and most secure solution is to disable them entirely. This can be done by removing `\u0027svg\u0027` from the list of allowed MIME types in `TypiCMS\\Modules\\Core\\Http\\Requests\\FileFormRequest.php`.\n\n ```php\n // In FileFormRequest.php\n // BEFORE:\n $fileRule = \u0027mimes:jpeg,gif,png,...,svg,...|max:...\u0027;\n\n // AFTER:\n $fileRule = \u0027mimes:jpeg,gif,png,...,pdf,...|max:...\u0027; // Removed \u0027svg\u0027\n ```\n\n3. **Hardening - Content-Security-Policy (CSP):**\n Implement a strict Content-Security-Policy (CSP) header for the application. A well-configured CSP can prevent the execution of inline scripts, which would mitigate the impact of this XSS vulnerability.\n\n4. **Hardening - Serve User Content from a Separate Domain:**\n Serve all user-uploaded files from a separate, cookie-less domain. This is a highly effective security measure that isolates user-generated content from the main application, preventing scripts from accessing session cookies or interacting with the application\u0027s DOM.",
"id": "GHSA-xfvg-8v67-j7wp",
"modified": "2026-02-25T16:06:59Z",
"published": "2026-02-25T16:06:59Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/TypiCMS/Core/security/advisories/GHSA-xfvg-8v67-j7wp"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27621"
},
{
"type": "WEB",
"url": "https://github.com/TypiCMS/Core/commit/d480a0be1e8e7c0600bb9a325bb11920ee66497d"
},
{
"type": "PACKAGE",
"url": "https://github.com/TypiCMS/Core"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
"type": "CVSS_V4"
}
],
"summary": "TypiCMS Core has Stored Cross-Site Scripting (XSS) via SVG File Upload"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.