CVE-2025-62793

6.8 MEDIUM

📋 TL;DR

eLabFTW versions before 5.3.0 serve uploaded SVG files inline without proper sanitization, allowing stored cross-site scripting (XSS) attacks. An attacker can upload a malicious SVG file that executes JavaScript when viewed, potentially hijacking user sessions, exfiltrating data, or performing unauthorized actions. This affects all users of vulnerable eLabFTW instances, particularly research labs using the software for electronic lab notebooks.

💻 Affected Systems

Products:
  • eLabFTW
Versions: All versions before 5.3.0
Operating Systems: All operating systems running eLabFTW
Default Config Vulnerable: ⚠️ Yes
Notes: Default configurations are vulnerable if SVG file uploads are enabled; no special settings required for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains full control of victim accounts, leading to data theft, session hijacking, or unauthorized modifications to lab data, potentially compromising research integrity.

🟠

Likely Case

Session hijacking or data exfiltration from users who view or interact with the malicious SVG, resulting in unauthorized access to sensitive lab information.

🟢

If Mitigated

Limited impact if SVG uploads are restricted or users are trained to avoid suspicious files, but risk remains if the vulnerability is unpatched.

🌐 Internet-Facing: HIGH, as internet-facing instances are directly accessible to attackers for uploading malicious SVGs and targeting victims.
🏢 Internal Only: MEDIUM, as internal users could still be targeted by malicious insiders or compromised accounts, but external attack surface is reduced.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires an attacker to upload a crafted SVG file and a victim to view it; no authentication bypass is needed, but user interaction is involved.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.3.0

Vendor Advisory: https://github.com/elabftw/elabftw/security/advisories/GHSA-rq98-8jh9-684f

Restart Required: No

Instructions:

1. Backup your eLabFTW instance and database. 2. Update to version 5.3.0 or later using the official upgrade instructions at https://doc.elabftw.net/upgrading.html. 3. Verify the update by checking the version in the application settings.

🔧 Temporary Workarounds

Disable SVG file uploads

all

Restrict or block SVG file uploads in eLabFTW configuration to prevent malicious uploads.

Modify eLabFTW configuration to set allowed file types excluding SVG; refer to documentation for specific steps.

🧯 If You Can't Patch

  • Implement strict content security policies (CSP) to block inline scripts and limit script execution from SVG files.
  • Monitor and audit SVG file uploads and user interactions with uploaded files for suspicious activity.

🔍 How to Verify

Check if Vulnerable:

Check the eLabFTW version in the application settings or via the web interface; if it is below 5.3.0, the instance is vulnerable.

Check Version:

Access the eLabFTW web interface and navigate to the settings or about page to view the version, or check the server logs for version information.

Verify Fix Applied:

After updating, confirm the version is 5.3.0 or higher and test by uploading a benign SVG file to ensure it is served with proper security headers or sanitization.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SVG file uploads, especially with script-like content; multiple failed or successful upload attempts from single IPs.

Network Indicators:

  • HTTP requests for SVG files with parameters or payloads indicative of XSS attempts; spikes in SVG file downloads.

SIEM Query:

Example: 'source="elabftw_logs" AND (file_extension="svg" OR file_type="image/svg+xml") AND (event="upload" OR event="download")'

🔗 References

📤 Share & Export