GHSA-XFVG-8V67-J7WP

Vulnerability from github – Published: 2026-02-25 16:06 – Updated: 2026-02-25 16:06
VLAI?
Summary
TypiCMS Core has Stored Cross-Site Scripting (XSS) via SVG File Upload
Details

I. Summary

A Stored Cross-Site Scripting (XSS) vulnerability exists in the file upload module of TypiCMS. The application allows users with file upload permissions to upload SVG files. While there is a MIME type validation, the content of the SVG file is not sanitized. An attacker can upload a specially crafted SVG file containing malicious JavaScript code. When another user (such as an administrator) views or accesses this file through the application, the script executes in their browser, leading to a compromise of that user's session.

The issue is exacerbated by a bug in the SVG parsing logic, which can cause a 500 error if the uploaded SVG does not contain a viewBox attribute. However, this does not mitigate the XSS vulnerability, as an attacker can easily include a valid viewBox attribute in their malicious payload.

II. Vulnerability Details

  • Vulnerability Type: Stored Cross-Site Scripting (XSS) (CWE-79)
  • Affected Component: TypiCMS\Modules\Core\Http\Requests\FileFormRequest.php and TypiCMS\Modules\Core\Services\FileUploader.php.
  • Affected Versions: <= 16.0.5

The vulnerability stems from two main points:

  1. Permissive File Validation: The FileFormRequest explicitly whitelists svg as an allowed MIME type for uploads.
  2. Lack of Content Sanitization: The FileUploader service saves the SVG file to the server without parsing and sanitizing its content to remove potentially malicious elements like <script> tags or on* event handlers.

When the default filesystem disk is set to public, the uploaded SVG file is stored in a publicly accessible directory, making it trivial to access the file via a direct URL and trigger the XSS payload.

III. Proof of Concept (PoC)

  1. Create a Malicious SVG File: Create a file named malicious.svg with the following content. The viewBox attribute is included to bypass the application's parsing bug.

    xml <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100"> <script> // A simple PoC to demonstrate the vulnerability alert('XSS in TypiCMS! Your session cookie is: ' + document.cookie); </script> <text x="10" y="50">If you see this, the script has run.</text> </svg>

  2. Upload the Malicious File:

    • Log in to the TypiCMS admin panel as a user with permissions to upload files.
    • Navigate to the "Files" module (e.g., /admin/files).
    • Upload the malicious.svg file. The application will accept the file and store it. image image
  3. Trigger the XSS:

    • The application will provide a public URL for the uploaded file, typically in the format http://<your-site>/storage/files/malicious.svg.
    • Anyone who navigates to this URL will have the embedded JavaScript executed in their browser.
    • An attacker can send this link to a privileged user (e.g., an administrator). When the administrator clicks the link, their session cookies can be stolen, or the attacker can perform actions on their behalf.

image image

IV. Impact

Successful exploitation of this vulnerability allows an attacker to execute arbitrary JavaScript in the context of the victim's browser. Although the use of the HttpOnly flag on session cookies prevents direct theft of the session ID via document.cookie, the attacker can still achieve a full compromise of the victim's account by performing actions on their behalf.

The impact includes:

  • Account Takeover via Action Forgery: The attacker's script can make authenticated requests to the application's API from the victim's browser. This allows the attacker to perform any action the victim is authorized to do, such as:

    • Creating a new administrator account for the attacker.
    • Changing the victim's email address and password.
    • Deleting or modifying all content, users, and settings.
  • Sensitive Information Disclosure: The script can read the content of any page the victim views within the admin panel. This includes lists of users (with names and emails), private application settings, and other sensitive data, which can then be exfiltrated to an attacker-controlled server.

  • Phishing and Social Engineering: The script can manipulate the admin panel's UI to display fake login forms to trick the user into re-entering their credentials, or redirect them to a malicious website.

  • Keystroke Logging: The script can capture any information the victim types into forms on the compromised page.

Because the attacker can perform any action as an authenticated administrator, this vulnerability effectively leads to a full application compromise, even without direct access to the session cookie. The risk is High.

V. Recommended Patches and Mitigations

It is recommended to apply a defense-in-depth approach to mitigate this vulnerability.

  1. Primary Fix: Sanitize SVG Content: The most robust solution is to sanitize SVG files upon upload. Before saving the file, it should be parsed to remove all potentially dangerous elements, including <script>, <style>, <foreignObject> tags, and all on* event attributes. This can be achieved using a dedicated SVG sanitization library.

  2. Secondary Fix: Disable SVG Uploads: If SVG uploads are not a critical feature for the application, the simplest and most secure solution is to disable them entirely. This can be done by removing 'svg' from the list of allowed MIME types in TypiCMS\Modules\Core\Http\Requests\FileFormRequest.php.

    ```php // In FileFormRequest.php // BEFORE: $fileRule = 'mimes:jpeg,gif,png,...,svg,...|max:...';

    // AFTER: $fileRule = 'mimes:jpeg,gif,png,...,pdf,...|max:...'; // Removed 'svg' ```

  3. Hardening - Content-Security-Policy (CSP): Implement a strict Content-Security-Policy (CSP) header for the application. A well-configured CSP can prevent the execution of inline scripts, which would mitigate the impact of this XSS vulnerability.

  4. Hardening - Serve User Content from a Separate Domain: Serve all user-uploaded files from a separate, cookie-less domain. This is a highly effective security measure that isolates user-generated content from the main application, preventing scripts from accessing session cookies or interacting with the application's DOM.

Show details on source website

{
  "affected": [
    {
      "package": {
        "ecosystem": "Packagist",
        "name": "typicms/core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "16.1.7"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "aliases": [
    "CVE-2026-27621"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-79"
    ],
    "github_reviewed": true,
    "github_reviewed_at": "2026-02-25T16:06:59Z",
    "nvd_published_at": "2026-02-25T03:16:06Z",
    "severity": "MODERATE"
  },
  "details": "#### I. Summary\n\nA Stored Cross-Site Scripting (XSS) vulnerability exists in the file upload module of TypiCMS. The application allows users with file upload permissions to upload SVG files. While there is a MIME type validation, the content of the SVG file is not sanitized. An attacker can upload a specially crafted SVG file containing malicious JavaScript code. When another user (such as an administrator) views or accesses this file through the application, the script executes in their browser, leading to a compromise of that user\u0027s session.\n\nThe issue is exacerbated by a bug in the SVG parsing logic, which can cause a 500 error if the uploaded SVG does not contain a `viewBox` attribute. However, this does not mitigate the XSS vulnerability, as an attacker can easily include a valid `viewBox` attribute in their malicious payload.\n\n#### II. Vulnerability Details\n\n*   **Vulnerability Type:** Stored Cross-Site Scripting (XSS) (CWE-79)\n*   **Affected Component:** `TypiCMS\\Modules\\Core\\Http\\Requests\\FileFormRequest.php` and `TypiCMS\\Modules\\Core\\Services\\FileUploader.php`.\n*  **Affected Versions:** \u003c= 16.0.5\n\nThe vulnerability stems from two main points:\n\n1.  **Permissive File Validation:** The `FileFormRequest` explicitly whitelists `svg` as an allowed MIME type for uploads.\n2.  **Lack of Content Sanitization:** The `FileUploader` service saves the SVG file to the server without parsing and sanitizing its content to remove potentially malicious elements like `\u003cscript\u003e` tags or `on*` event handlers.\n\nWhen the default filesystem disk is set to `public`, the uploaded SVG file is stored in a publicly accessible directory, making it trivial to access the file via a direct URL and trigger the XSS payload.\n\n#### III. Proof of Concept (PoC)\n\n1.  **Create a Malicious SVG File:**\n    Create a file named `malicious.svg` with the following content. The `viewBox` attribute is included to bypass the application\u0027s parsing bug.\n\n    ```xml\n    \u003csvg xmlns=\"http://www.w3.org/2000/svg\" viewBox=\"0 0 100 100\"\u003e\n        \u003cscript\u003e\n            // A simple PoC to demonstrate the vulnerability\n            alert(\u0027XSS in TypiCMS! Your session cookie is: \u0027 + document.cookie);\n        \u003c/script\u003e\n        \u003ctext x=\"10\" y=\"50\"\u003eIf you see this, the script has run.\u003c/text\u003e\n    \u003c/svg\u003e\n    ```\n\n2.  **Upload the Malicious File:**\n    *   Log in to the TypiCMS admin panel as a user with permissions to upload files.\n    *   Navigate to the \"Files\" module (e.g., `/admin/files`).\n    *   Upload the `malicious.svg` file. The application will accept the file and store it.\n\u003cimg width=\"2540\" height=\"1217\" alt=\"image\" src=\"https://github.com/user-attachments/assets/beb8ace9-ac39-442c-a2bc-3fbfb09f8c32\" /\u003e\n\u003cimg width=\"1718\" height=\"671\" alt=\"image\" src=\"https://github.com/user-attachments/assets/9cd4a3f8-28e3-4223-8203-7ab292eaf95f\" /\u003e\n\n3.  **Trigger the XSS:**\n    *   The application will provide a public URL for the uploaded file, typically in the format `http://\u003cyour-site\u003e/storage/files/malicious.svg`.\n    *   Anyone who navigates to this URL will have the embedded JavaScript executed in their browser.\n    *   An attacker can send this link to a privileged user (e.g., an administrator). When the administrator clicks the link, their session cookies can be stolen, or the attacker can perform actions on their behalf.\n    \n\u003cimg width=\"2091\" height=\"704\" alt=\"image\" src=\"https://github.com/user-attachments/assets/99c915bb-a518-46aa-b237-390cd58f34e7\" /\u003e\n\u003cimg width=\"1457\" height=\"996\" alt=\"image\" src=\"https://github.com/user-attachments/assets/0ed000ec-78cf-4ed8-8cd5-2886fbb2afc0\" /\u003e\n\n\n#### IV. Impact\n\nSuccessful exploitation of this vulnerability allows an attacker to execute arbitrary JavaScript in the context of the victim\u0027s browser. Although the use of the `HttpOnly` flag on session cookies prevents direct theft of the session ID via `document.cookie`, the attacker can still achieve a full compromise of the victim\u0027s account by performing actions on their behalf.\n\nThe impact includes:\n\n*   **Account Takeover via Action Forgery:** The attacker\u0027s script can make authenticated requests to the application\u0027s API from the victim\u0027s browser. This allows the attacker to perform any action the victim is authorized to do, such as:\n    *   Creating a new administrator account for the attacker.\n    *   Changing the victim\u0027s email address and password.\n    *   Deleting or modifying all content, users, and settings.\n\n*   **Sensitive Information Disclosure:** The script can read the content of any page the victim views within the admin panel. This includes lists of users (with names and emails), private application settings, and other sensitive data, which can then be exfiltrated to an attacker-controlled server.\n\n*   **Phishing and Social Engineering:** The script can manipulate the admin panel\u0027s UI to display fake login forms to trick the user into re-entering their credentials, or redirect them to a malicious website.\n\n*   **Keystroke Logging:** The script can capture any information the victim types into forms on the compromised page.\n\nBecause the attacker can perform any action as an authenticated administrator, this vulnerability effectively leads to a **full application compromise**, even without direct access to the session cookie. The risk is **High**.\n\n\n#### V. Recommended Patches and Mitigations\n\nIt is recommended to apply a defense-in-depth approach to mitigate this vulnerability.\n\n1.  **Primary Fix: Sanitize SVG Content:**\n    The most robust solution is to sanitize SVG files upon upload. Before saving the file, it should be parsed to remove all potentially dangerous elements, including `\u003cscript\u003e`, `\u003cstyle\u003e`, `\u003cforeignObject\u003e` tags, and all `on*` event attributes. This can be achieved using a dedicated SVG sanitization library.\n\n2.  **Secondary Fix: Disable SVG Uploads:**\n    If SVG uploads are not a critical feature for the application, the simplest and most secure solution is to disable them entirely. This can be done by removing `\u0027svg\u0027` from the list of allowed MIME types in `TypiCMS\\Modules\\Core\\Http\\Requests\\FileFormRequest.php`.\n\n    ```php\n    // In FileFormRequest.php\n    // BEFORE:\n    $fileRule = \u0027mimes:jpeg,gif,png,...,svg,...|max:...\u0027;\n\n    // AFTER:\n    $fileRule = \u0027mimes:jpeg,gif,png,...,pdf,...|max:...\u0027; // Removed \u0027svg\u0027\n    ```\n\n3.  **Hardening - Content-Security-Policy (CSP):**\n    Implement a strict Content-Security-Policy (CSP) header for the application. A well-configured CSP can prevent the execution of inline scripts, which would mitigate the impact of this XSS vulnerability.\n\n4.  **Hardening - Serve User Content from a Separate Domain:**\n    Serve all user-uploaded files from a separate, cookie-less domain. This is a highly effective security measure that isolates user-generated content from the main application, preventing scripts from accessing session cookies or interacting with the application\u0027s DOM.",
  "id": "GHSA-xfvg-8v67-j7wp",
  "modified": "2026-02-25T16:06:59Z",
  "published": "2026-02-25T16:06:59Z",
  "references": [
    {
      "type": "WEB",
      "url": "https://github.com/TypiCMS/Core/security/advisories/GHSA-xfvg-8v67-j7wp"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27621"
    },
    {
      "type": "WEB",
      "url": "https://github.com/TypiCMS/Core/commit/d480a0be1e8e7c0600bb9a325bb11920ee66497d"
    },
    {
      "type": "PACKAGE",
      "url": "https://github.com/TypiCMS/Core"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
      "type": "CVSS_V4"
    }
  ],
  "summary": "TypiCMS Core has Stored Cross-Site Scripting (XSS) via SVG File Upload"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…