Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66403: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in error311 FileRise

0
Medium
VulnerabilityCVE-2025-66403cvecve-2025-66403cwe-79
Published: Mon Dec 01 2025 (12/01/2025, 22:20:56 UTC)
Source: CVE Database V5
Vendor/Project: error311
Product: FileRise

Description

FileRise is a self-hosted web-based file manager with multi-file upload, editing, and batch operations. Prior to 2.2.3, a stored cross-site scripting (XSS) vulnerability exists in the Filerise application due to improper handling of uploaded SVG files. The application accepts user-supplied SVG uploads without sanitizing or restricting embedded script content. When a malicious SVG containing inline JavaScript or event-based payloads is uploaded, it is later rendered directly in the browser whenever viewed within the application. Because SVGs are XML-based and allow scripting, they execute in the origin context of the application, enabling full stored XSS. This vulnerability is fixed in 2.2.3.

AI-Powered Analysis

AILast updated: 12/01/2025, 22:38:50 UTC

Technical Analysis

CVE-2025-66403 is a stored cross-site scripting vulnerability identified in the FileRise web-based file manager application, specifically in versions prior to 2.2.3. FileRise allows users to upload and manage files, including SVG images. SVG files are XML-based and can embed JavaScript or event-driven payloads. The vulnerability stems from FileRise's failure to properly sanitize or restrict scripts embedded within uploaded SVG files. When a malicious SVG containing inline JavaScript is uploaded, it is stored on the server and later rendered directly in the user's browser when accessed through the application interface. Because the SVG executes in the same origin context as the application, this enables attackers to execute arbitrary scripts, potentially stealing session tokens, manipulating the DOM, or performing actions on behalf of the user. Exploitation requires the attacker to have authenticated access to upload malicious SVGs and for a victim user to view the infected file, indicating user interaction is necessary. The CVSS v3.1 base score is 4.6, reflecting low complexity of attack but limited impact scope (confidentiality and integrity partial impact, no availability impact). No known exploits have been reported in the wild as of the published date. The vulnerability is resolved in FileRise version 2.2.3, which implements proper sanitization or restrictions on SVG uploads to prevent script execution. This vulnerability is categorized under CWE-79 (Improper Neutralization of Input During Web Page Generation).

Potential Impact

For European organizations using vulnerable versions of FileRise, this stored XSS vulnerability poses a moderate risk primarily to confidentiality and integrity. Attackers with authenticated access can upload malicious SVG files that execute scripts in the context of other users, potentially leading to session hijacking, unauthorized actions, or data theft within the application. While availability is not impacted, the breach of user trust and potential data leakage can have regulatory and reputational consequences, especially under GDPR requirements. Organizations with sensitive or regulated data managed via FileRise are at higher risk. The requirement for authentication and user interaction limits the attack surface but does not eliminate risk, particularly in environments with multiple users or less stringent access controls. The lack of known active exploits reduces immediate threat but patching remains critical to prevent future exploitation. The impact is more pronounced in sectors relying on FileRise for collaborative file management, such as legal, financial, and governmental institutions in Europe.

Mitigation Recommendations

1. Upgrade all FileRise instances to version 2.2.3 or later immediately to apply the official fix that sanitizes SVG uploads. 2. Implement strict file upload policies that restrict or disallow SVG files unless absolutely necessary. If SVG uploads are required, use server-side SVG sanitization tools (e.g., SVG sanitizers that remove scripts and event handlers) before storing or rendering files. 3. Enforce least privilege access controls to limit who can upload files, reducing the risk of malicious uploads. 4. Educate users to be cautious when viewing uploaded SVG files and monitor for unusual file uploads or user behavior. 5. Employ Content Security Policy (CSP) headers to restrict script execution contexts and mitigate impact of any injected scripts. 6. Regularly audit and monitor FileRise logs for suspicious activity related to file uploads and access. 7. Consider isolating the FileRise application in a segmented network zone to limit lateral movement if compromise occurs. 8. Review and update incident response plans to include scenarios involving stored XSS attacks in file management applications.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-28T23:33:56.364Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692e15786dbd3477d748216e

Added to database: 12/1/2025, 10:23:52 PM

Last enriched: 12/1/2025, 10:38:50 PM

Last updated: 12/1/2025, 11:27:25 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats