PT-2026-32912 · October · October
Daftspunk
·
Published
2026-04-14
·
Updated
2026-04-15
·
CVE-2026-25133
CVSS v4.0
5.3
Medium
| AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N |
Name of the Vulnerable Software and Affected Versions
October versions prior to 3.7.14
October versions prior to 4.1.10
Description
A stored cross-site scripting (XSS) issue exists in the SVG sanitization logic. The regex pattern used to strip event handler attributes, such as
onclick or onload, can be bypassed using a crafted payload that exploits how the pattern matches attribute boundaries. This allows malicious SVG files with embedded JavaScript to be uploaded through the Media Manager. Exploitation requires authenticated backend access with media.library.create permissions and occurs when the SVG is viewed or embedded in a page. This could lead to privilege escalation if a superuser views the file.Recommendations
Update to version 3.7.14.
Update to version 4.1.10.
Disable SVG uploads by adding
svg to the blocked extensions in media configuration.
Set media.clean vectors to true in configuration.Fix
XSS
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
October