Vulnerability DatabaseGHSA-mg4c-884j-pcq9

GHSA-mg4c-884j-pcq9
PHP vulnerability analysis and mitigation

Overview

A Stored Cross-Site Scripting (XSS) vulnerability was discovered in Leantime versions prior to 3.3. The vulnerability, identified as GHSA-mg4c-884j-pcq9, was published on February 18, 2025, and involves SVG file uploads that could lead to stored XSS and open redirection attacks. The issue affects the Leantime project management software package (leantime/leantime) (GitHub Advisory).

Technical details

The vulnerability has been assessed with a CVSS v4.0 score of 5.1 (Moderate severity) with the following vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N. The attack vector is network-based with low attack complexity, requiring low privileges and passive user interaction. The vulnerability is associated with CWE-79, which relates to improper neutralization of input during web page generation (GitHub Advisory).

Impact

The vulnerability impacts both confidentiality and integrity at a low level, with no impact on availability. The vulnerability allows attackers to potentially execute stored XSS attacks and perform open redirections through SVG file uploads (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in Leantime version 3.3. The fix involves removing SVG file support from the allowed image file types, as evidenced by the removal of the 'svg' => 'image/svg+xml' mapping and its corresponding file extension check (Leantime Commit).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management