Stored XSS Via SVG Upload in kiwitcms/kiwi
Reported on
May 23rd 2023
Description
I've found a Stored XSS via uploading SVG file with the following content:
<svg xmlns="http://www.w3.org/2000/svg" onload="alert(document.domain)"><defs><font id="x"><font-face font-family="y"/></font></defs></svg>
Proof of Concept
https://drive.google.com/file/d/16HC08PPqAHZuubz-1IMJYZSETpTQZOzA/view?usp=sharing
Impact
Stored XSS vulnerabilities can lead to data theft, account compromise, and the distribution of malware. Attackers can inject malicious scripts into a website, allowing them to steal sensitive information or hijack user sessions. Additionally, stored XSS can result in website defacement and content manipulation, causing reputational damage. It can also be used as a platform for launching phishing attacks, tricking users into revealing their credentials or sensitive data.
Our team will be working on a fix immediately. Stay tuned for updates.
CVE number and additional information is handled via GitHub, see https://github.com/kiwitcms/Kiwi/security/advisories/GHSA-2fqm-m4r2-fh98
Hi @admin, this report has assigned CVE by github which is CVE-2023-33977.
Can you please update it here.
No. huntr.dev doesn't allow assignment of external CVE IDs. It's a limitation of the platform.