Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41084: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in SESAME LABS S.L Sesame

0
Medium
VulnerabilityCVE-2025-41084cvecve-2025-41084cwe-79
Published: Tue Jan 20 2026 (01/20/2026, 09:14:40 UTC)
Source: CVE Database V5
Vendor/Project: SESAME LABS S.L
Product: Sesame

Description

Stored Cross-Site Scripting (XSS) vulnerability in Sesame web application, due to the fact that uploaded SVG images are not properly sanitized. This allows attackers to embed malicious scripts in SVG files by sending a POST request using the 'logo' parameter in '/api/v3/companies/<ID>/logo', which are then stored on the server and executed in the context of any user who accesses the compromised resource.

AI-Powered Analysis

AILast updated: 01/30/2026, 08:29:25 UTC

Technical Analysis

CVE-2025-41084 is a stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79, affecting all versions of the Sesame web application developed by SESAME LABS S.L. The vulnerability stems from improper neutralization of input during web page generation, specifically when handling uploaded SVG images. Attackers can exploit this by sending a specially crafted POST request to the '/api/v3/companies/<ID>/logo' endpoint, using the 'logo' parameter to upload an SVG file containing embedded malicious JavaScript. Because the application fails to sanitize or validate the SVG content properly, the malicious script is stored on the server and executed whenever any user accesses the affected resource, such as viewing the company logo. This stored XSS can lead to session hijacking, credential theft, unauthorized actions performed on behalf of the user, or further exploitation of the victim's browser environment. The vulnerability requires no authentication (PR:L means low privileges) but does require user interaction (UI:P) to trigger the malicious script. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, partial user interaction, and limited scope impact. No patches or known exploits are currently available, but the vulnerability is publicly disclosed and assigned a medium severity rating with a CVSS score of 5.1. The vulnerability's presence in all versions of Sesame indicates a systemic issue in input sanitization for SVG uploads.

Potential Impact

For European organizations using the Sesame web application, this vulnerability poses a moderate risk. Exploitation could allow attackers to execute arbitrary scripts in the context of users accessing the compromised resource, potentially leading to session hijacking, theft of sensitive information, or unauthorized actions within the application. This can undermine user trust, lead to data breaches, and cause reputational damage. Since Sesame is used for company-related data, attackers might leverage this to gain further footholds or pivot to other systems. The medium severity reflects the fact that exploitation requires some user interaction and low privilege access, limiting the attack surface somewhat. However, the widespread impact on confidentiality and integrity of user sessions and data is significant. European organizations with public-facing Sesame instances or those that allow multiple users to upload logos are particularly at risk. The lack of current patches means organizations must rely on mitigations until an official fix is released.

Mitigation Recommendations

Organizations should immediately implement strict input validation and sanitization for SVG uploads, ideally disallowing SVG files or using a secure SVG sanitizer that removes scripts and potentially dangerous elements. Employ Content Security Policy (CSP) headers to restrict script execution and reduce the impact of any injected scripts. Limit the ability to upload logos or images to trusted users only and monitor upload endpoints for suspicious activity. Conduct regular security reviews and penetration testing focused on file upload functionalities. If possible, isolate the logo display context to prevent script execution or use sandboxed iframes. Keep the Sesame application updated and monitor SESAME LABS S.L communications for patches addressing this vulnerability. Additionally, educate users about the risks of interacting with untrusted content and implement multi-factor authentication to reduce the impact of session hijacking.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
INCIBE
Date Reserved
2025-04-16T09:09:35.597Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696f48f94623b1157c2703fb

Added to database: 1/20/2026, 9:20:57 AM

Last enriched: 1/30/2026, 8:29:25 AM

Last updated: 2/7/2026, 11:24:34 AM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats