Home

Description

eLabFTW is an open source electronic lab notebook for research labs. The application served uploaded SVG files inline. Because SVG supports active content, an attacker could upload a crafted SVG that executes script when viewed, resulting in stored XSS under the application origin. A victim who opens the SVG URL or any page embedding it could have their session hijacked, data exfiltrated, or actions performed on their behalf. This vulnerability is fixed n 5.3.0.

PUBLISHED Reserved 2025-10-22 | Published 2025-10-27 | Updated 2025-10-28 | Assigner GitHub_M




MEDIUM: 6.8CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

< 5.3.0
affected

References

github.com/...labftw/security/advisories/GHSA-rq98-8jh9-684f

github.com/...ommit/09b95e38f82f041edac0dd6962c70499e2d8d8e2

cve.org (CVE-2025-62793)

nvd.nist.gov (CVE-2025-62793)

Download JSON