Submit #634084: Open-Source Samarium - Business Management System 0.9.6 Arbitrary JavaScript Execution via Unsanitized SVG Uploadinfo

TitleOpen-Source Samarium - Business Management System 0.9.6 Arbitrary JavaScript Execution via Unsanitized SVG Upload
DescriptionA vulnerability has been identified in the open source project Samarium - Business Management System, version v0.9.6. During testing, it was possible to upload malicious files with the .svg extension, which could lead to a system compromise. During a security assessment of the application, it was identified that the image upload feature in /dashboard/team (used for creating a new team) accepts SVG files without proper sanitization. An attacker can exploit this by uploading a specially crafted .svg file containing embedded JavaScript. When this file is rendered in a browser, the malicious script executes in the context of the victim’s session.
Source⚠️ https://github.com/MaiqueSilva/VulnDB/blob/main/readme10.md
User
 maique (UID 88562)
Submission08/14/2025 01:14 (8 months ago)
Moderation08/25/2025 11:17 (11 days later)
StatusAccepted
VulDB entry321265 [oitcode samarium up to 0.9.6 Team Image /dashboard/team cross site scripting]
Points20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!