FileRise is a self-hosted web-based file manager with multi-file upload, editing, and batch operations. Prior to 2.2.3, a stored cross-site scripting (XSS) vulnerability exists in the Filerise application due to improper handling of uploaded SVG files. The application accepts user-supplied SVG uploads without sanitizing or restricting embedded script content. When a malicious SVG containing inline JavaScript or event-based payloads is uploaded, it is later rendered directly in the browser whenever viewed within the application. Because SVGs are XML-based and allow scripting, they execute in the origin context of the application, enabling full stored XSS. This vulnerability is fixed in 2.2.3.
References
| Link | Resource |
|---|---|
| https://github.com/error311/FileRise/commit/f2ce43f18f0444f8f63f7c33758d1837dd5ba91e | Patch |
| https://github.com/error311/FileRise/security/advisories/GHSA-qrcv-vjvf-fr29 | Vendor Advisory Exploit |
Configurations
History
No history.
Information
Published : 2025-12-01 23:15
Updated : 2026-01-07 20:50
NVD link : CVE-2025-66403
Mitre link : CVE-2025-66403
CVE.ORG link : CVE-2025-66403
JSON object : View
Products Affected
filerise
- filerise
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
