A vulnerability in the file upload at bookmark + asset rendering pipeline allows an attacker to upload a malicious SVG file with JavaScript content. When an authenticated admin user views the SVG file with embedded JavaScript code of shared bookmark, JavaScript executes in the admin’s browser, retrieves the CSRF token, and sends a request to change the admin's password resulting in a full account takeover.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://www.cve.org/cverecord?id=CVE-2025-14202 |
|
History
Wed, 17 Dec 2025 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability in the file upload at bookmark + asset rendering pipeline allows an attacker to upload a malicious SVG file with JavaScript content. When an authenticated admin user views the SVG file with embedded JavaScript code of shared bookmark, JavaScript executes in the admin’s browser, retrieves the CSRF token, and sends a request to change the admin's password resulting in a full account takeover. | |
| Title | Cross-Site Request Forgery (CSRF) Leading to Account Takeover via SVG File Upload | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Gridware
Published:
Updated: 2025-12-17T23:35:17.515Z
Reserved: 2025-12-07T00:38:32.831Z
Link: CVE-2025-14202
No data.
Status : Received
Published: 2025-12-18T00:16:21.493
Modified: 2025-12-18T00:16:21.493
Link: CVE-2025-14202
No data.
OpenCVE Enrichment
No data.