Vulnerability Description
WonderCMS version 2.4.0 contains a Stored Cross-Site Scripting on File Upload through SVG vulnerability in uploadFileAction(), 'svg' => 'image/svg+xml' that can result in An attacker can execute arbitrary script on an unsuspecting user's browser. This attack appear to be exploitable via Crafted SVG File.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wondercms | Wondercms | 2.4.0 |
Related Weaknesses (CWE)
References
- https://github.com/robiso/wondercms/blob/ea640a02b4b8d88835d2e01600d24b23176fb66PatchThird Party Advisory
- https://github.com/robiso/wondercms/issues/56Third Party Advisory
- https://github.com/robiso/wondercms/blob/ea640a02b4b8d88835d2e01600d24b23176fb66PatchThird Party Advisory
- https://github.com/robiso/wondercms/issues/56Third Party Advisory
FAQ
What is CVE-2018-1000062?
CVE-2018-1000062 is a vulnerability with a CVSS score of 4.4 (MEDIUM). WonderCMS version 2.4.0 contains a Stored Cross-Site Scripting on File Upload through SVG vulnerability in uploadFileAction(), 'svg' => 'image/svg+xml' that can result in An attacker can execute arbit...
How severe is CVE-2018-1000062?
CVE-2018-1000062 has been rated MEDIUM with a CVSS base score of 4.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-1000062?
Check the references section above for vendor advisories and patch information. Affected products include: Wondercms Wondercms.