CVE-2025-61183
PHP vulnerability analysis and mitigation

Overview

A Stored Cross-Site Scripting (XSS) vulnerability (CVE-2025-61183) was discovered in VaahCMS version 2.3.1. The vulnerability exists in the storeAvatar() method of UserBase.php, which allows a remote attacker to execute arbitrary code through unsafe SVG file handling during avatar uploads. The vulnerability was disclosed on October 8, 2025, and primarily affects the file upload functionality in the application's backend (GitHub Issue, NVD).

Technical details

The vulnerability stems from improper file handling in the storeAvatar() method, where files are stored before content or MIME-type validation occurs. The vulnerable endpoint is POST /backend/vaah/manage/media/upload. The vulnerability has been assigned a CVSS v3.1 base score of 6.1 (Medium) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N. The issue is classified as CWE-79 (Improper Neutralization of Input During Web Page Generation) (NVD).

Impact

Successful exploitation allows attackers to control the content and filename of files written to a public storage path (/storage/media/YYYY/MM/.svg). When these SVG files are rendered by a user's browser through various HTML elements, the embedded malicious JavaScript executes, leading to persistent Cross-Site Scripting attacks (GitHub POC).

Mitigation and workarounds

Temporary mitigation measures include disabling SVG file uploads entirely, implementing server-side file type validation using MIME type checking before storing files, using a dedicated SVG sanitizer library (such as enshrined/svg-sanitize for PHP), storing uploaded files outside the web root, serving them through a secure proxy, and implementing automatic cleanup of files that fail validation. The vendor has acknowledged the vulnerability and a fix is pending (GitHub POC).

Additional resources


SourceThis report was generated using AI

Related PHP vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-10353CRITICAL9.3
  • PHPPHP
  • melisplatform/melis-cms-slider
NoYesOct 08, 2025
CVE-2025-10352CRITICAL9.3
  • PHPPHP
  • melisplatform/melis-core
NoYesOct 08, 2025
CVE-2025-10351CRITICAL9.3
  • PHPPHP
  • melisplatform/melis-cms
NoYesOct 08, 2025
CVE-2025-61183MEDIUM6.1
  • PHPPHP
  • webreinvent/vaahcms
NoNoOct 08, 2025
CVE-2025-11570MEDIUM4.8
  • PHPPHP
  • drupal-pattern-lab/unified-twig-extensions
NoNoOct 10, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management