
Cloud Vulnerability DB
A community-led vulnerabilities database
In PageKit v1.0.18, a vulnerability was discovered that allows users to upload SVG files containing malicious scripts through the CMS file upload functionality. The vulnerability was assigned CVE-2021-32245 and was disclosed on June 16, 2021 (NVD, GitHub Issue).
The vulnerability exists in the file upload functionality of PageKit CMS version 1.0.18. When a user uploads an SVG file, the system does not properly strip or filter the file content, allowing malicious scripts within the SVG to remain intact. The vulnerability was confirmed in an environment running nginx 1.15.11, MySQL 5.7.26, and PHP 7.3.4 (GitHub Issue).
When exploited, this vulnerability allows attackers to execute arbitrary JavaScript code in victims' browsers when the malicious SVG file is accessed. The attack can be triggered when users click on links pointing to the uploaded SVG file (e.g., '/storage/exp.svg'), resulting in a stored Cross-Site Scripting (XSS) attack (GitHub Issue).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."