CVE-2025-61183
PHP vulnerability analysis and mitigation

Overview

Cross Site Scripting (XSS) vulnerability was discovered in VaahCMS version 2.3.1, specifically in the storeAvatar() method of UserBase.php. The vulnerability allows a remote attacker to execute arbitrary code via the upload method, which was disclosed on October 8, 2025. This security flaw affects the avatar upload functionality of VaahCMS, a PHP-based content management system (NVD, Miggo).

Technical details

The vulnerability has been assigned a CVSS v3.1 base score of 6.1 (Medium) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N. The flaw is categorized as CWE-79 (Improper Neutralization of Input During Web Page Generation). The vulnerability stems from file storage occurring before content or MIME-type validation, leaving malicious files on a predictable, publicly accessible path on the server at /storage/media/YYYY/MM/.svg (GitHub POC).

Impact

Successful exploitation allows an attacker to control the content and filename of a file written to a public storage path. If the publicly accessible SVG is subsequently rendered by a user's browser via an HTML element or crafted link, the embedded script will execute, leading to persistent XSS. This could potentially allow attackers to steal session cookies, perform actions on behalf of users, or redirect them to malicious sites (GitHub Issue).

Mitigation and workarounds

Several temporary mitigation strategies have been recommended: disable SVG file uploads entirely in the application, implement server-side file type validation using MIME type checking before storing files, use a dedicated SVG sanitizer library (such as enshrined/svg-sanitize for PHP), store uploaded files outside the web root and serve them through a secure proxy, and implement automatic cleanup of files that fail validation. The vendor has acknowledged the vulnerability and a fix is pending (GitHub POC).

Additional resources


SourceThis report was generated using AI

Related PHP vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-23622HIGH8.7
  • PHPPHP
  • alextselegidis/easyappointments
NoNoJan 15, 2026
CVE-2025-14894HIGH7.5
  • PHPPHP
  • livewire-filemanager/filemanager
NoNoJan 16, 2026
CVE-2026-23626MEDIUM6.8
  • PHPPHP
  • kimai/kimai
NoYesJan 18, 2026
CVE-2025-69198MEDIUM6
  • PHPPHP
  • pterodactyl/panel
NoYesJan 19, 2026
CVE-2026-23496MEDIUM5.4
  • PHPPHP
  • pimcore/web2print-tools-bundle
NoYesJan 15, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management