CVE-2025-64759

8.1 HIGH

📋 TL;DR

This stored XSS vulnerability in Homarr allows attackers to execute arbitrary JavaScript in users' browsers by uploading a malicious SVG file, potentially granting administrative access if an admin views the file. It affects all Homarr instances prior to version 1.43.3. Users with administrative privileges are at highest risk.

💻 Affected Systems

Products:
  • Homarr
Versions: All versions prior to 1.43.3
Operating Systems: All operating systems where Homarr is installed
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability is present in default configurations where SVG uploads are allowed.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains full administrative control over the Homarr dashboard, allowing them to modify settings, access sensitive data, or compromise the underlying system.

🟠

Likely Case

Attackers exploit the vulnerability to steal session cookies, perform actions as logged-in users, or escalate privileges to admin level.

🟢

If Mitigated

With proper input validation and patching, the risk is eliminated, preventing any malicious SVG execution.

🌐 Internet-Facing: HIGH, as internet-facing instances are directly accessible to attackers who can upload malicious SVGs.
🏢 Internal Only: MEDIUM, as internal instances may still be vulnerable to insider threats or compromised internal accounts.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires an attacker to upload a malicious SVG and trick an admin into viewing it, but the technical steps are straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.43.3

Vendor Advisory: https://github.com/homarr-labs/homarr/security/advisories/GHSA-wj62-c5gr-2x53

Restart Required: Yes

Instructions:

1. Backup your Homarr configuration. 2. Update Homarr to version 1.43.3 or later using your package manager or by pulling the latest Docker image. 3. Restart the Homarr service.

🔧 Temporary Workarounds

Disable SVG uploads

all

Temporarily block SVG file uploads in Homarr to prevent exploitation.

Modify Homarr configuration to restrict file uploads to non-SVG formats; specific commands depend on deployment method.

🧯 If You Can't Patch

  • Restrict access to Homarr to trusted users only and monitor for unusual SVG uploads.
  • Implement a web application firewall (WAF) to block malicious SVG payloads.

🔍 How to Verify

Check if Vulnerable:

Check the Homarr version; if it is below 1.43.3, it is vulnerable.

Check Version:

docker exec homarr-container cat /app/package.json | grep version (adjust for your setup)

Verify Fix Applied:

Confirm the Homarr version is 1.43.3 or higher and test that SVG uploads no longer execute JavaScript.

📡 Detection & Monitoring

Log Indicators:

  • Log entries showing SVG file uploads, especially with suspicious content or from untrusted sources.

Network Indicators:

  • Unusual HTTP requests to upload SVG files or unexpected redirects to SVG resources.

SIEM Query:

source="homarr_logs" AND (file_extension="svg" OR file_type="image/svg+xml")

🔗 References

📤 Share & Export