CVE-2025-66403
📋 TL;DR
FileRise versions before 2.2.3 have a stored XSS vulnerability where malicious SVG files containing JavaScript can be uploaded and executed when viewed. This allows attackers to perform actions within the application context, potentially stealing session cookies or performing unauthorized actions. All users running vulnerable versions are affected.
💻 Affected Systems
- FileRise
📦 What is this software?
Filerise by Filerise
⚠️ Risk & Real-World Impact
Worst Case
Attacker gains full control of victim's session, steals credentials, performs administrative actions, or installs malware on client systems.
Likely Case
Session hijacking, credential theft, or unauthorized file operations within the application.
If Mitigated
Limited impact with proper content security policies and user awareness, but still potential for limited session compromise.
🎯 Exploit Status
Exploitation requires file upload access and victim to view the malicious SVG.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.2.3
Vendor Advisory: https://github.com/error311/FileRise/security/advisories/GHSA-qrcv-vjvf-fr29
Restart Required: Yes
Instructions:
1. Backup your FileRise installation and data. 2. Download version 2.2.3 from the official repository. 3. Replace existing files with new version. 4. Restart the web server/service.
🔧 Temporary Workarounds
Disable SVG uploads
allConfigure FileRise to reject SVG file uploads entirely
Edit FileRise configuration to add SVG to blocked file types
Implement Content Security Policy
allAdd CSP headers to prevent script execution from uploaded files
Add 'Content-Security-Policy: default-src 'self'; script-src 'self'' to web server headers
🧯 If You Can't Patch
- Implement strict file upload validation to sanitize SVG content
- Isolate FileRise instance and restrict access to trusted users only
🔍 How to Verify
Check if Vulnerable:
Check if FileRise version is below 2.2.3 and SVG uploads are allowed without sanitization.
Check Version:
Check FileRise admin panel or version file in installation directory
Verify Fix Applied:
Test uploading an SVG with script content - it should be rejected or sanitized in version 2.2.3.
📡 Detection & Monitoring
Log Indicators:
- Unusual SVG file uploads
- Multiple failed upload attempts
- Large SVG files with encoded content
Network Indicators:
- SVG uploads containing script tags or JavaScript
- Unusual file type patterns in upload traffic
SIEM Query:
source="filerise" AND (file_type="svg" OR file_extension="svg") AND size>10000