CVE-2025-45055

5.4 MEDIUM

📋 TL;DR

Silverpeas 6.4.2 contains a stored XSS vulnerability in the event management module where authenticated users can upload malicious SVG files. When administrators view these files, embedded JavaScript executes in their session, potentially allowing privilege escalation to create new admin accounts. This affects all Silverpeas 6.4.2 installations with the event module enabled.

💻 Affected Systems

Products:
  • Silverpeas
Versions: 6.4.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires event management module to be enabled and accessible to authenticated users.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full administrative control, create persistent backdoor accounts, access sensitive data, and potentially compromise the entire Silverpeas instance and connected systems.

🟠

Likely Case

Privilege escalation leading to unauthorized administrative access, data theft, and further system compromise within the Silverpeas environment.

🟢

If Mitigated

Limited impact with proper input validation, file type restrictions, and CSRF protections in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated user access and administrator interaction with malicious SVG files.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.4.3 or later

Vendor Advisory: https://github.com/Silverpeas/Silverpeas-Core/pull/1394

Restart Required: Yes

Instructions:

1. Backup Silverpeas installation and database
2. Download Silverpeas 6.4.3 or later from official sources
3. Follow Silverpeas upgrade documentation
4. Restart Silverpeas service
5. Verify upgrade completed successfully

🔧 Temporary Workarounds

Disable SVG uploads

all

Configure Silverpeas to reject SVG file uploads in event attachments

Modify Silverpeas configuration to add SVG to blocked file types list

Restrict event module access

all

Limit which users can access event management features

Configure role-based access controls in Silverpeas administration panel

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to block inline script execution
  • Deploy web application firewall (WAF) rules to detect and block malicious SVG uploads

🔍 How to Verify

Check if Vulnerable:

Check Silverpeas version via administration panel or by examining installation files for version 6.4.2

Check Version:

Check Silverpeas web interface administration panel or examine WEB-INF/version.properties file

Verify Fix Applied:

Verify Silverpeas version is 6.4.3 or later and test SVG upload functionality with embedded scripts

📡 Detection & Monitoring

Log Indicators:

  • Unusual SVG file uploads in event module logs
  • Multiple failed privilege escalation attempts
  • Administrator account creation from unusual IPs

Network Indicators:

  • HTTP POST requests with SVG files to event attachment endpoints
  • Subsequent requests suggesting admin session hijacking

SIEM Query:

source="silverpeas" AND (file_extension="svg" OR event="attachment_upload")

🔗 References

📤 Share & Export