Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66403: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in error311 FileRise

0
Medium
VulnerabilityCVE-2025-66403cvecve-2025-66403cwe-79
Published: Mon Dec 01 2025 (12/01/2025, 22:20:56 UTC)
Source: CVE Database V5
Vendor/Project: error311
Product: FileRise

Description

FileRise is a self-hosted web-based file manager with multi-file upload, editing, and batch operations. Prior to 2.2.3, a stored cross-site scripting (XSS) vulnerability exists in the Filerise application due to improper handling of uploaded SVG files. The application accepts user-supplied SVG uploads without sanitizing or restricting embedded script content. When a malicious SVG containing inline JavaScript or event-based payloads is uploaded, it is later rendered directly in the browser whenever viewed within the application. Because SVGs are XML-based and allow scripting, they execute in the origin context of the application, enabling full stored XSS. This vulnerability is fixed in 2.2.3.

AI-Powered Analysis

AILast updated: 12/08/2025, 23:16:54 UTC

Technical Analysis

CVE-2025-66403 is a stored cross-site scripting vulnerability identified in the FileRise web-based file manager before version 2.2.3. FileRise allows users to upload and manage files through a web interface, including SVG images. SVG files are XML-based and can embed JavaScript, which can be executed by browsers when the SVG is rendered. The vulnerability stems from FileRise's failure to sanitize or restrict embedded scripts within uploaded SVG files. An attacker with authenticated access can upload a crafted SVG containing malicious JavaScript payloads. When other users view the SVG within the application, the embedded script executes in the application's origin context, enabling full stored XSS. This can lead to session hijacking, unauthorized actions, or data theft within the scope of the application. The vulnerability requires user interaction to view the malicious SVG and privileges to upload files, limiting its exploitation scope. The CVSS 3.1 base score is 4.6, indicating medium severity due to the low impact on confidentiality and integrity, no availability impact, and the need for authentication and user interaction. No public exploits have been reported yet. The issue is resolved in FileRise version 2.2.3 by implementing proper sanitization or restrictions on SVG uploads to prevent script execution. Organizations using vulnerable versions should prioritize patching to mitigate risks.

Potential Impact

For European organizations, this vulnerability can lead to unauthorized script execution within the FileRise application context, potentially compromising user sessions, stealing sensitive data, or performing unauthorized actions on behalf of users. Since FileRise is a self-hosted file manager, exploitation could allow attackers to pivot within internal networks or escalate privileges if the application is integrated with other systems. The impact is primarily on confidentiality and integrity, with no direct availability impact. Organizations handling sensitive or regulated data are at higher risk due to potential data leakage or manipulation. The requirement for authenticated upload and user interaction reduces the likelihood of widespread exploitation but does not eliminate targeted attacks. Industries such as finance, healthcare, and government agencies using FileRise for file management are particularly vulnerable. The medium severity rating suggests that while the threat is not critical, it warrants timely remediation to prevent exploitation. Failure to address this vulnerability could lead to reputational damage and compliance issues under European data protection regulations like GDPR.

Mitigation Recommendations

1. Upgrade FileRise to version 2.2.3 or later immediately to apply the official fix that sanitizes SVG uploads. 2. Implement strict file upload policies restricting SVG files or disallowing SVG uploads if not essential. 3. Use server-side content sanitization tools to strip scripts and event handlers from SVG files before storage or rendering. 4. Employ Content Security Policy (CSP) headers to restrict script execution and mitigate XSS impact if exploitation occurs. 5. Monitor file upload logs and user activities for suspicious SVG uploads or unusual behavior. 6. Educate users about the risks of uploading untrusted files and encourage cautious handling of file uploads. 7. Conduct regular security assessments and penetration testing focused on file upload functionalities. 8. Isolate the FileRise application environment to limit lateral movement in case of compromise. 9. Review and tighten authentication and authorization controls to minimize the number of users able to upload files. 10. Maintain up-to-date backups to recover quickly from any potential compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-28T23:33:56.364Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692e15786dbd3477d748216e

Added to database: 12/1/2025, 10:23:52 PM

Last enriched: 12/8/2025, 11:16:54 PM

Last updated: 1/16/2026, 3:10:24 AM

Views: 51

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats