Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41084: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in SESAME LABS, S.L Sesame

0
Medium
VulnerabilityCVE-2025-41084cvecve-2025-41084cwe-79
Published: Tue Jan 20 2026 (01/20/2026, 09:14:40 UTC)
Source: CVE Database V5
Vendor/Project: SESAME LABS, S.L
Product: Sesame

Description

CVE-2025-41084 is a stored Cross-Site Scripting (XSS) vulnerability affecting all versions of the Sesame web application by SESAME LABS, S. L. The flaw arises because uploaded SVG images are not properly sanitized, allowing attackers to embed malicious scripts within SVG files via the 'logo' parameter in the '/api/v3/companies/<ID>/logo' endpoint. These malicious scripts are stored on the server and executed in the context of any user who accesses the compromised resource, potentially leading to session hijacking, data theft, or unauthorized actions. The vulnerability has a medium CVSS 4. 0 score of 5. 1, reflecting network exploitability without authentication but requiring user interaction. No known exploits are currently reported in the wild. European organizations using Sesame are at risk, especially those with public-facing or multi-user deployments. Mitigation requires implementing strict SVG sanitization, restricting allowed SVG content, and applying input validation on the upload endpoint.

AI-Powered Analysis

AILast updated: 01/20/2026, 09:35:16 UTC

Technical Analysis

CVE-2025-41084 is a stored Cross-Site Scripting (XSS) vulnerability categorized under CWE-79, found in the Sesame web application developed by SESAME LABS, S.L. The vulnerability stems from improper neutralization of input during web page generation, specifically in the handling of uploaded SVG images. Attackers can exploit this by sending a crafted POST request to the '/api/v3/companies/<ID>/logo' endpoint, using the 'logo' parameter to upload an SVG file containing embedded malicious JavaScript code. Because the application does not sanitize the SVG content properly, the malicious script is stored on the server and later executed in the browser context of any user who views the affected resource, such as company logos displayed in the application. This stored XSS can lead to session hijacking, credential theft, unauthorized actions on behalf of users, or further exploitation of the victim’s browser environment. The vulnerability affects all versions of Sesame, indicating a systemic issue in input validation and sanitization mechanisms. The CVSS 4.0 vector indicates the attack is network exploitable without authentication (AV:N, PR:L), requires user interaction (UI:P), and has limited scope and impact on confidentiality, integrity, and availability (VC:N, VI:N, VA:N). No public exploits are currently known, but the risk remains due to the nature of stored XSS and its potential for abuse in multi-user environments.

Potential Impact

For European organizations using the Sesame application, this vulnerability poses a risk of client-side attacks that can compromise user sessions and data confidentiality. Stored XSS can be leveraged to steal authentication tokens, perform actions on behalf of users, or deliver further malware payloads. Organizations with public-facing Sesame deployments or those that allow multiple users to upload logos or images are particularly vulnerable. The impact extends to reputational damage, regulatory non-compliance (e.g., GDPR if personal data is exposed), and potential disruption of business operations. Since the vulnerability affects all versions, organizations without timely mitigation remain exposed. The medium CVSS score reflects moderate risk, but the ease of exploitation via network and the stored nature of the XSS increase the threat in environments with many users. European sectors such as finance, healthcare, and government using Sesame could face targeted attacks exploiting this flaw.

Mitigation Recommendations

To mitigate CVE-2025-41084, organizations should implement strict server-side sanitization of all uploaded SVG files, removing or neutralizing any embedded scripts or potentially dangerous elements. Employing libraries specialized in secure SVG sanitization (e.g., DOMPurify configured for SVG) is recommended. Restrict the types of allowed SVG content to only essential graphical elements, disallowing script tags, event handlers, and external resource references. Additionally, enforce strong input validation on the '/api/v3/companies/<ID>/logo' endpoint to reject malformed or suspicious SVG uploads. Implement Content Security Policy (CSP) headers to limit script execution contexts and reduce XSS impact. Regularly audit and monitor logs for suspicious upload activity and user behavior. Finally, coordinate with SESAME LABS, S.L for official patches or updates and apply them promptly once available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
INCIBE
Date Reserved
2025-04-16T09:09:35.597Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696f48f94623b1157c2703fb

Added to database: 1/20/2026, 9:20:57 AM

Last enriched: 1/20/2026, 9:35:16 AM

Last updated: 1/20/2026, 12:47:42 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats