Wiki.js prior to version 2.5.264 is prone to stored cross-site scripting via SVG file upload. Learn about the impact, affected systems, exploitation mechanism, and mitigation steps.
Wiki.js 2.5.263 and earlier versions are susceptible to stored cross-site scripting (XSS) via SVG file upload. The vulnerability allows attackers to execute malicious JavaScript code when other users view the SVG files directly.
Understanding CVE-2021-43855
What is CVE-2021-43855?
Wiki.js, a node.js-based wiki app, has a stored cross-site scripting vulnerability in versions prior to 2.5.264. This flaw enables an attacker to embed malicious scripts within SVG files, triggering XSS attacks when viewed directly.
The Impact of CVE-2021-43855
The vulnerability has a CVSS base score of 8.2 (High severity). Exploitation requires user interaction. Attack vectors are through network access, affecting confidentiality and integrity.
Technical Details of CVE-2021-43855
Vulnerability Description
The flaw allows malicious users to upload crafted SVG files with fake MIME types, leading to stored XSS attacks. Only direct SVG views trigger script execution, not when loaded via normal <img> tags.
Affected Systems and Versions
Exploitation Mechanism
Mitigation and Prevention
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
For patching details and updates, refer to the GitHub links provided.