CVE-2025-45055
📋 TL;DR
Silverpeas 6.4.2 contains a stored XSS vulnerability in the event management module where authenticated users can upload malicious SVG files. When administrators view these files, embedded JavaScript executes in their session, potentially allowing privilege escalation to create new admin accounts. This affects all Silverpeas 6.4.2 installations with the event module enabled.
💻 Affected Systems
- Silverpeas
📦 What is this software?
Silverpeas by Silverpeas
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain full administrative control, create persistent backdoor accounts, access sensitive data, and potentially compromise the entire Silverpeas instance and connected systems.
Likely Case
Privilege escalation leading to unauthorized administrative access, data theft, and further system compromise within the Silverpeas environment.
If Mitigated
Limited impact with proper input validation, file type restrictions, and CSRF protections in place.
🎯 Exploit Status
Exploitation requires authenticated user access and administrator interaction with malicious SVG files.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 6.4.3 or later
Vendor Advisory: https://github.com/Silverpeas/Silverpeas-Core/pull/1394
Restart Required: Yes
Instructions:
1. Backup Silverpeas installation and database
2. Download Silverpeas 6.4.3 or later from official sources
3. Follow Silverpeas upgrade documentation
4. Restart Silverpeas service
5. Verify upgrade completed successfully
🔧 Temporary Workarounds
Disable SVG uploads
allConfigure Silverpeas to reject SVG file uploads in event attachments
Modify Silverpeas configuration to add SVG to blocked file types list
Restrict event module access
allLimit which users can access event management features
Configure role-based access controls in Silverpeas administration panel
🧯 If You Can't Patch
- Implement strict Content Security Policy (CSP) headers to block inline script execution
- Deploy web application firewall (WAF) rules to detect and block malicious SVG uploads
🔍 How to Verify
Check if Vulnerable:
Check Silverpeas version via administration panel or by examining installation files for version 6.4.2
Check Version:
Check Silverpeas web interface administration panel or examine WEB-INF/version.properties file
Verify Fix Applied:
Verify Silverpeas version is 6.4.3 or later and test SVG upload functionality with embedded scripts
📡 Detection & Monitoring
Log Indicators:
- Unusual SVG file uploads in event module logs
- Multiple failed privilege escalation attempts
- Administrator account creation from unusual IPs
Network Indicators:
- HTTP POST requests with SVG files to event attachment endpoints
- Subsequent requests suggesting admin session hijacking
SIEM Query:
source="silverpeas" AND (file_extension="svg" OR event="attachment_upload")