CVE-2021-25967: CWE-79 Cross-site Scripting (XSS) in ckan ckan
In CKAN, versions 2.9.0 to 2.9.3 are affected by a stored XSS vulnerability via SVG file upload of users’ profile picture. This allows low privileged application users to store malicious scripts in their profile picture. These scripts are executed in a victim’s browser when they open the malicious profile picture
AI Analysis
Technical Summary
CVE-2021-25967 is a stored Cross-site Scripting (XSS) vulnerability affecting CKAN versions 2.9.0 through 2.9.3. CKAN is an open-source data management system widely used for publishing and sharing datasets. The vulnerability arises from insufficient sanitization of SVG files uploaded as users' profile pictures. Specifically, low-privileged users can upload malicious SVG images containing embedded scripts. When other users or administrators view the profile picture, the malicious script executes in their browsers, leading to potential session hijacking, credential theft, or unauthorized actions within the CKAN web application context. The vulnerability requires the attacker to have an authenticated account with the ability to upload profile pictures, and the victim must interact with the malicious profile image for exploitation to occur. The CVSS v3.1 base score is 5.4 (medium severity), reflecting network attack vector, low attack complexity, low privileges required, but requiring user interaction and resulting in limited confidentiality and integrity impact without affecting availability. No known public exploits have been reported. The vulnerability is categorized under CWE-79, indicating improper neutralization of input leading to XSS. The scope is changed (S:C), meaning the vulnerability affects components beyond the vulnerable component itself, potentially impacting other users. No official patches are linked in the provided data, but remediation typically involves sanitizing SVG uploads to remove scripts or disabling SVG uploads altogether. This vulnerability can be leveraged to conduct targeted attacks within organizations using CKAN, especially those with collaborative data sharing environments.
Potential Impact
For European organizations utilizing CKAN versions 2.9.0 to 2.9.3, this vulnerability poses a risk of client-side code execution within trusted environments. Attackers with low privileges can embed malicious scripts in profile pictures, which execute in the browsers of other users, potentially leading to session hijacking, data theft, or privilege escalation within the application. This can compromise the confidentiality and integrity of sensitive datasets managed via CKAN portals. Given CKAN's use in government, research institutions, and open data portals across Europe, exploitation could undermine trust in data integrity and availability. While availability is not directly impacted, the breach of confidentiality and integrity could lead to reputational damage, regulatory non-compliance (e.g., GDPR), and operational disruptions. The requirement for user interaction (viewing the malicious profile picture) limits automated exploitation but does not eliminate risk, especially in environments with frequent user collaboration and profile browsing. The medium CVSS score reflects these factors, but the impact can be significant in high-value data contexts.
Mitigation Recommendations
1. Immediately upgrade CKAN installations to versions beyond 2.9.3 where this vulnerability is patched or apply vendor-provided patches if available. 2. Implement strict server-side sanitization of SVG files to remove any embedded scripts or disallow SVG uploads entirely if not essential. 3. Enforce Content Security Policy (CSP) headers to restrict script execution origins and mitigate impact of injected scripts. 4. Conduct regular audits of user-uploaded profile pictures to detect and remove potentially malicious SVG files. 5. Limit profile picture upload permissions to trusted users or administrators where feasible. 6. Educate users to be cautious when viewing profile pictures and report suspicious behavior. 7. Monitor web application logs for unusual activity indicative of XSS exploitation attempts. 8. Consider deploying web application firewalls (WAF) with rules targeting XSS payloads in SVG uploads. 9. Review and tighten user privilege assignments to minimize low-privileged users’ ability to upload files. These measures combined reduce the attack surface and mitigate exploitation risk beyond generic advice.
Affected Countries
United Kingdom, Germany, France, Netherlands, Sweden, Finland, Denmark, Belgium, Italy, Spain
CVE-2021-25967: CWE-79 Cross-site Scripting (XSS) in ckan ckan
Description
In CKAN, versions 2.9.0 to 2.9.3 are affected by a stored XSS vulnerability via SVG file upload of users’ profile picture. This allows low privileged application users to store malicious scripts in their profile picture. These scripts are executed in a victim’s browser when they open the malicious profile picture
AI-Powered Analysis
Technical Analysis
CVE-2021-25967 is a stored Cross-site Scripting (XSS) vulnerability affecting CKAN versions 2.9.0 through 2.9.3. CKAN is an open-source data management system widely used for publishing and sharing datasets. The vulnerability arises from insufficient sanitization of SVG files uploaded as users' profile pictures. Specifically, low-privileged users can upload malicious SVG images containing embedded scripts. When other users or administrators view the profile picture, the malicious script executes in their browsers, leading to potential session hijacking, credential theft, or unauthorized actions within the CKAN web application context. The vulnerability requires the attacker to have an authenticated account with the ability to upload profile pictures, and the victim must interact with the malicious profile image for exploitation to occur. The CVSS v3.1 base score is 5.4 (medium severity), reflecting network attack vector, low attack complexity, low privileges required, but requiring user interaction and resulting in limited confidentiality and integrity impact without affecting availability. No known public exploits have been reported. The vulnerability is categorized under CWE-79, indicating improper neutralization of input leading to XSS. The scope is changed (S:C), meaning the vulnerability affects components beyond the vulnerable component itself, potentially impacting other users. No official patches are linked in the provided data, but remediation typically involves sanitizing SVG uploads to remove scripts or disabling SVG uploads altogether. This vulnerability can be leveraged to conduct targeted attacks within organizations using CKAN, especially those with collaborative data sharing environments.
Potential Impact
For European organizations utilizing CKAN versions 2.9.0 to 2.9.3, this vulnerability poses a risk of client-side code execution within trusted environments. Attackers with low privileges can embed malicious scripts in profile pictures, which execute in the browsers of other users, potentially leading to session hijacking, data theft, or privilege escalation within the application. This can compromise the confidentiality and integrity of sensitive datasets managed via CKAN portals. Given CKAN's use in government, research institutions, and open data portals across Europe, exploitation could undermine trust in data integrity and availability. While availability is not directly impacted, the breach of confidentiality and integrity could lead to reputational damage, regulatory non-compliance (e.g., GDPR), and operational disruptions. The requirement for user interaction (viewing the malicious profile picture) limits automated exploitation but does not eliminate risk, especially in environments with frequent user collaboration and profile browsing. The medium CVSS score reflects these factors, but the impact can be significant in high-value data contexts.
Mitigation Recommendations
1. Immediately upgrade CKAN installations to versions beyond 2.9.3 where this vulnerability is patched or apply vendor-provided patches if available. 2. Implement strict server-side sanitization of SVG files to remove any embedded scripts or disallow SVG uploads entirely if not essential. 3. Enforce Content Security Policy (CSP) headers to restrict script execution origins and mitigate impact of injected scripts. 4. Conduct regular audits of user-uploaded profile pictures to detect and remove potentially malicious SVG files. 5. Limit profile picture upload permissions to trusted users or administrators where feasible. 6. Educate users to be cautious when viewing profile pictures and report suspicious behavior. 7. Monitor web application logs for unusual activity indicative of XSS exploitation attempts. 8. Consider deploying web application firewalls (WAF) with rules targeting XSS payloads in SVG uploads. 9. Review and tighten user privilege assignments to minimize low-privileged users’ ability to upload files. These measures combined reduce the attack surface and mitigate exploitation risk beyond generic advice.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Mend
- Date Reserved
- 2021-01-22T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d983bc4522896dcbedcc4
Added to database: 5/21/2025, 9:09:15 AM
Last enriched: 6/25/2025, 9:16:21 AM
Last updated: 8/7/2025, 10:30:56 PM
Views: 14
Related Threats
CVE-2025-9093: Improper Export of Android Application Components in BuzzFeed App
MediumCVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.