CVE-2025-66403: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in error311 FileRise
FileRise is a self-hosted web-based file manager with multi-file upload, editing, and batch operations. Prior to 2.2.3, a stored cross-site scripting (XSS) vulnerability exists in the Filerise application due to improper handling of uploaded SVG files. The application accepts user-supplied SVG uploads without sanitizing or restricting embedded script content. When a malicious SVG containing inline JavaScript or event-based payloads is uploaded, it is later rendered directly in the browser whenever viewed within the application. Because SVGs are XML-based and allow scripting, they execute in the origin context of the application, enabling full stored XSS. This vulnerability is fixed in 2.2.3.
AI Analysis
Technical Summary
CVE-2025-66403 is a stored cross-site scripting vulnerability identified in the FileRise web-based file manager application, specifically in versions prior to 2.2.3. FileRise allows users to upload and manage files, including SVG images. SVG files are XML-based and can embed JavaScript or event-driven payloads. The vulnerability stems from FileRise's failure to properly sanitize or restrict scripts embedded within uploaded SVG files. When a malicious SVG containing inline JavaScript is uploaded, it is stored on the server and later rendered directly in the user's browser when accessed through the application interface. Because the SVG executes in the same origin context as the application, this enables attackers to execute arbitrary scripts, potentially stealing session tokens, manipulating the DOM, or performing actions on behalf of the user. Exploitation requires the attacker to have authenticated access to upload malicious SVGs and for a victim user to view the infected file, indicating user interaction is necessary. The CVSS v3.1 base score is 4.6, reflecting low complexity of attack but limited impact scope (confidentiality and integrity partial impact, no availability impact). No known exploits have been reported in the wild as of the published date. The vulnerability is resolved in FileRise version 2.2.3, which implements proper sanitization or restrictions on SVG uploads to prevent script execution. This vulnerability is categorized under CWE-79 (Improper Neutralization of Input During Web Page Generation).
Potential Impact
For European organizations using vulnerable versions of FileRise, this stored XSS vulnerability poses a moderate risk primarily to confidentiality and integrity. Attackers with authenticated access can upload malicious SVG files that execute scripts in the context of other users, potentially leading to session hijacking, unauthorized actions, or data theft within the application. While availability is not impacted, the breach of user trust and potential data leakage can have regulatory and reputational consequences, especially under GDPR requirements. Organizations with sensitive or regulated data managed via FileRise are at higher risk. The requirement for authentication and user interaction limits the attack surface but does not eliminate risk, particularly in environments with multiple users or less stringent access controls. The lack of known active exploits reduces immediate threat but patching remains critical to prevent future exploitation. The impact is more pronounced in sectors relying on FileRise for collaborative file management, such as legal, financial, and governmental institutions in Europe.
Mitigation Recommendations
1. Upgrade all FileRise instances to version 2.2.3 or later immediately to apply the official fix that sanitizes SVG uploads. 2. Implement strict file upload policies that restrict or disallow SVG files unless absolutely necessary. If SVG uploads are required, use server-side SVG sanitization tools (e.g., SVG sanitizers that remove scripts and event handlers) before storing or rendering files. 3. Enforce least privilege access controls to limit who can upload files, reducing the risk of malicious uploads. 4. Educate users to be cautious when viewing uploaded SVG files and monitor for unusual file uploads or user behavior. 5. Employ Content Security Policy (CSP) headers to restrict script execution contexts and mitigate impact of any injected scripts. 6. Regularly audit and monitor FileRise logs for suspicious activity related to file uploads and access. 7. Consider isolating the FileRise application in a segmented network zone to limit lateral movement if compromise occurs. 8. Review and update incident response plans to include scenarios involving stored XSS attacks in file management applications.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Austria
CVE-2025-66403: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in error311 FileRise
Description
FileRise is a self-hosted web-based file manager with multi-file upload, editing, and batch operations. Prior to 2.2.3, a stored cross-site scripting (XSS) vulnerability exists in the Filerise application due to improper handling of uploaded SVG files. The application accepts user-supplied SVG uploads without sanitizing or restricting embedded script content. When a malicious SVG containing inline JavaScript or event-based payloads is uploaded, it is later rendered directly in the browser whenever viewed within the application. Because SVGs are XML-based and allow scripting, they execute in the origin context of the application, enabling full stored XSS. This vulnerability is fixed in 2.2.3.
AI-Powered Analysis
Technical Analysis
CVE-2025-66403 is a stored cross-site scripting vulnerability identified in the FileRise web-based file manager application, specifically in versions prior to 2.2.3. FileRise allows users to upload and manage files, including SVG images. SVG files are XML-based and can embed JavaScript or event-driven payloads. The vulnerability stems from FileRise's failure to properly sanitize or restrict scripts embedded within uploaded SVG files. When a malicious SVG containing inline JavaScript is uploaded, it is stored on the server and later rendered directly in the user's browser when accessed through the application interface. Because the SVG executes in the same origin context as the application, this enables attackers to execute arbitrary scripts, potentially stealing session tokens, manipulating the DOM, or performing actions on behalf of the user. Exploitation requires the attacker to have authenticated access to upload malicious SVGs and for a victim user to view the infected file, indicating user interaction is necessary. The CVSS v3.1 base score is 4.6, reflecting low complexity of attack but limited impact scope (confidentiality and integrity partial impact, no availability impact). No known exploits have been reported in the wild as of the published date. The vulnerability is resolved in FileRise version 2.2.3, which implements proper sanitization or restrictions on SVG uploads to prevent script execution. This vulnerability is categorized under CWE-79 (Improper Neutralization of Input During Web Page Generation).
Potential Impact
For European organizations using vulnerable versions of FileRise, this stored XSS vulnerability poses a moderate risk primarily to confidentiality and integrity. Attackers with authenticated access can upload malicious SVG files that execute scripts in the context of other users, potentially leading to session hijacking, unauthorized actions, or data theft within the application. While availability is not impacted, the breach of user trust and potential data leakage can have regulatory and reputational consequences, especially under GDPR requirements. Organizations with sensitive or regulated data managed via FileRise are at higher risk. The requirement for authentication and user interaction limits the attack surface but does not eliminate risk, particularly in environments with multiple users or less stringent access controls. The lack of known active exploits reduces immediate threat but patching remains critical to prevent future exploitation. The impact is more pronounced in sectors relying on FileRise for collaborative file management, such as legal, financial, and governmental institutions in Europe.
Mitigation Recommendations
1. Upgrade all FileRise instances to version 2.2.3 or later immediately to apply the official fix that sanitizes SVG uploads. 2. Implement strict file upload policies that restrict or disallow SVG files unless absolutely necessary. If SVG uploads are required, use server-side SVG sanitization tools (e.g., SVG sanitizers that remove scripts and event handlers) before storing or rendering files. 3. Enforce least privilege access controls to limit who can upload files, reducing the risk of malicious uploads. 4. Educate users to be cautious when viewing uploaded SVG files and monitor for unusual file uploads or user behavior. 5. Employ Content Security Policy (CSP) headers to restrict script execution contexts and mitigate impact of any injected scripts. 6. Regularly audit and monitor FileRise logs for suspicious activity related to file uploads and access. 7. Consider isolating the FileRise application in a segmented network zone to limit lateral movement if compromise occurs. 8. Review and update incident response plans to include scenarios involving stored XSS attacks in file management applications.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-28T23:33:56.364Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 692e15786dbd3477d748216e
Added to database: 12/1/2025, 10:23:52 PM
Last enriched: 12/1/2025, 10:38:50 PM
Last updated: 12/1/2025, 11:27:25 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-66415: CWE-441: Unintended Proxy or Intermediary ('Confused Deputy') in fastify fastify-reply-from
MediumCVE-2025-66448: CWE-94: Improper Control of Generation of Code ('Code Injection') in vllm-project vllm
HighCVE-2025-66401: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in kapilduraphe mcp-watch
CriticalCVE-2025-66312: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in getgrav grav
MediumCVE-2025-66311: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in getgrav grav
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.