| Title | Open-Source Samarium - Business Management System 0.9.6 Arbitrary JavaScript Execution via Unsanitized SVG Upload |
|---|
| Description | A vulnerability has been identified in the open source project Samarium - Business Management System, version v0.9.6. During testing, it was possible to upload malicious files with the .svg extension, which could lead to a system compromise.
During a security assessment of the application, it was identified that the image upload feature in /dashboard/team (used for creating a new team) accepts SVG files without proper sanitization. An attacker can exploit this by uploading a specially crafted .svg file containing embedded JavaScript. When this file is rendered in a browser, the malicious script executes in the context of the victim’s session. |
|---|
| Source | ⚠️ https://github.com/MaiqueSilva/VulnDB/blob/main/readme10.md |
|---|
| User | maique (UID 88562) |
|---|
| Submission | 08/14/2025 01:14 (8 months ago) |
|---|
| Moderation | 08/25/2025 11:17 (11 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 321265 [oitcode samarium up to 0.9.6 Team Image /dashboard/team cross site scripting] |
|---|
| Points | 20 |
|---|