Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-33103: n/a

0
Medium
VulnerabilityCVE-2024-33103cvecve-2024-33103
Published: Tue Apr 30 2024 (04/30/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-33103 is an arbitrary file upload vulnerability in the Media Manager component of DokuWiki version 2024-02-06a. It allows attackers to upload a crafted SVG file that can lead to arbitrary code execution. Exploitation requires user interaction and may only be possible if the product is misconfigured. The vulnerability has a CVSS score of 6. 1, indicating medium severity, with a low impact on confidentiality and integrity but no impact on availability. No known exploits are currently reported in the wild. The vulnerability is related to CWE-79, which involves improper neutralization of input leading to cross-site scripting or similar issues. Organizations using DokuWiki with the affected Media Manager component should review their configurations and restrict SVG uploads to mitigate risk. This vulnerability primarily affects organizations using DokuWiki, which is popular in various countries but more prevalent in Europe and North America. Given the medium severity and exploitation conditions, the threat requires attention but is not critical at this time.

AI-Powered Analysis

AILast updated: 02/26/2026, 04:21:32 UTC

Technical Analysis

CVE-2024-33103 identifies an arbitrary file upload vulnerability in the Media Manager component of DokuWiki version 2024-02-06a. The vulnerability enables attackers to upload specially crafted SVG files that can execute arbitrary code on the server. This occurs because the Media Manager does not properly validate or sanitize SVG files, which can contain embedded scripts or malicious payloads. The vulnerability is linked to CWE-79, indicating issues with improper input neutralization, commonly associated with cross-site scripting (XSS) or similar injection flaws. However, exploitation requires user interaction, such as an authenticated user uploading the malicious SVG file, and may only be feasible if the DokuWiki instance is misconfigured, for example, by allowing unrestricted SVG uploads or lacking proper file type restrictions. The CVSS 3.1 score of 6.1 reflects a medium severity, with network attack vector, low attack complexity, no privileges required, but requiring user interaction. The scope is changed, indicating that successful exploitation affects components beyond the vulnerable one. Currently, no public exploits or active exploitation in the wild have been reported. The vulnerability highlights the risk of arbitrary file uploads in web applications that handle user-generated content, especially when file validation is insufficient. Organizations using DokuWiki should audit their Media Manager configurations, restrict SVG uploads, and apply any available patches or updates once released.

Potential Impact

If exploited, this vulnerability could allow attackers to execute arbitrary code on the affected DokuWiki server, potentially leading to unauthorized access, data leakage, or further compromise of the hosting environment. Although the impact on confidentiality and integrity is rated low, successful exploitation could enable attackers to manipulate wiki content, inject malicious scripts, or pivot to other systems within the network. The requirement for user interaction and potential misconfiguration limits the attack surface, reducing the likelihood of widespread exploitation. However, organizations relying on DokuWiki for internal documentation or collaboration could face operational disruptions or reputational damage if their instances are compromised. The absence of known exploits in the wild suggests limited current risk, but the vulnerability should be addressed proactively to prevent future attacks.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately review and harden their DokuWiki Media Manager configurations. Specifically, restrict or disable SVG file uploads unless absolutely necessary, as SVG files can contain embedded scripts. Implement strict file type validation and sanitization on all uploaded files. Employ web application firewalls (WAFs) to detect and block malicious upload attempts targeting SVG or other vector files. Ensure that DokuWiki instances are updated to the latest versions once patches addressing this vulnerability are released. Additionally, enforce the principle of least privilege for users who can upload files, and monitor upload activity for suspicious behavior. Conduct regular security audits and penetration tests focusing on file upload functionalities. Educate users about the risks of uploading untrusted files and require authentication for upload actions to reduce exposure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-04-23T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c39b7ef31ef0b5614af

Added to database: 2/25/2026, 9:40:09 PM

Last enriched: 2/26/2026, 4:21:32 AM

Last updated: 2/26/2026, 6:13:02 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats