Vulnerability DatabaseGHSA-r9cr-qmfw-pmrc

GHSA-r9cr-qmfw-pmrc
Ruby vulnerability analysis and mitigation

Overview

A stored cross-site scripting (XSS) vulnerability was discovered in Camaleon CMS's image upload functionality, identified as GHSA-r9cr-qmfw-pmrc. The vulnerability affects versions below 2.8.1 and was patched in version 2.8.1. The issue allows normal registered users to upload SVG images containing malicious JavaScript or HTML documents by manipulating the format parameter (GitHub Advisory).

Technical details

The vulnerability exists in the image upload functionality where users can upload SVG files containing JavaScript code or HTML documents by modifying the format parameter. When an authenticated user or administrator visits the uploaded file, the malicious JavaScript executes in their context. The vulnerability is rated as Moderate with a CVSS score of 4.8, requiring low attack complexity and user interaction. The attack vector is network-based and requires low privileges (GitHub Advisory).

Impact

The vulnerability can lead to account takeover through cross-site scripting (XSS). When exploited, attackers can execute arbitrary JavaScript in the context of authenticated users or administrators, potentially allowing them to change or delete content within the CMS. The auth_token cookie, which only changes when a user changes their password, can be stolen through this attack (GitHub Advisory).

Mitigation and workarounds

The recommended mitigation strategies include: only allowing upload of safe files (PNG, TXT), serving unsafe files with a content-disposition: attachment header, implementing a Content Security Policy (CSP) that disallows inline scripts, marking the auth_token with HttpOnly flag, and considering the use of Ruby on Rails authentication for token expiration. These changes were implemented in version 2.8.1 (GitHub Commit).

Additional resources


SourceThis report was generated using AI

Related Ruby vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-68271CRITICAL10
  • RubyRuby
  • openc3
NoYesJan 13, 2026
CVE-2026-22589HIGH7.5
  • RubyRuby
  • spree_core
NoYesJan 10, 2026
GHSA-96qw-h329-v5rgHIGH7.5
  • JavaScriptJavaScript
  • shakapacker
NoYesJan 08, 2026
CVE-2026-22588MEDIUM6.5
  • RubyRuby
  • spree_api
NoYesJan 08, 2026
GHSA-g9jg-w8vm-g96vMEDIUM4.6
  • JavaScriptJavaScript
  • action_text-trix
NoYesDec 31, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management