
Cloud Vulnerability DB
A community-led vulnerabilities database
A security vulnerability (CVE-2025-10909) has been discovered in Mangati NovoSGA versions up to 2.2.9. The vulnerability affects the SVG File Handler component in the /admin endpoint, specifically involving the logoNavbar/logoLogin parameters. This cross-site scripting vulnerability was discovered and disclosed on September 24, 2025 (NVD, VulDB).
The vulnerability stems from improper validation and sanitization of user inputs in the logoNavbar and logoLogin parameters within the /admin endpoint. The application fails to properly validate SVG file uploads, allowing attackers to inject malicious scripts that are stored on the server. The vulnerability has received a CVSS v4.0 score of 4.8 (Medium) and CVSS v3.1 score of 2.4 (Low). The weakness is classified under CWE-79 (Cross-site Scripting) and CWE-94 (Code Injection) (VulDB, HackMD).
The vulnerability can lead to multiple severe impacts including session cookie theft enabling session hijacking, malware distribution through user deception, browser hijacking, credential theft, sensitive information exposure, website defacement, user misdirection, and potential damage to business reputation through unauthorized content modification (HackMD).
The vendor was contacted about this disclosure but did not respond in any way. No official patches or mitigations have been released at the time of disclosure. It is recommended to consider replacing the affected product with an alternative solution until a fix is available (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."