| Title | Open-Source Samarium - Business Management System 0.9.6 Arbitrary JavaScript Execution via Unsanitized SVG Upload |
|---|
| Description | A Cross-Site Scripting (XSS) vulnerability has been identified in Samarium - Business Management System, version v0.9.6. The application allows SVG files to be uploaded through the image upload feature in /cms/webpage/ without proper validation or sanitization.
An attacker can exploit this flaw by uploading a malicious .svg file containing embedded JavaScript code. When the file is accessed directly from the /gallery directory and rendered by the browser, the malicious code is executed in the context of the victim's session. The attack can even be exploited against unauthenticated users if the link to the malicious file is shared. |
|---|
| Source | ⚠️ https://github.com/MaiqueSilva/VulnDB/blob/main/README09.md |
|---|
| User | maique (UID 88562) |
|---|
| Submission | 08/13/2025 20:55 (8 months ago) |
|---|
| Moderation | 08/25/2025 11:12 (12 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 321259 [oitcode samarium up to 0.9.6 Pages Image /cms/webpage/ cross site scripting] |
|---|
| Points | 20 |
|---|