A vulnerability in the file upload at bookmark + asset rendering pipeline allows an attacker to upload a malicious SVG file with JavaScript content. When an authenticated admin user views the SVG file with embedded JavaScript code of shared bookmark, JavaScript executes in the admin’s browser, retrieves the CSRF token, and sends a request to change the admin's password resulting in a full account takeover.
History

Wed, 17 Dec 2025 23:45:00 +0000

Type Values Removed Values Added
Description A vulnerability in the file upload at bookmark + asset rendering pipeline allows an attacker to upload a malicious SVG file with JavaScript content. When an authenticated admin user views the SVG file with embedded JavaScript code of shared bookmark, JavaScript executes in the admin’s browser, retrieves the CSRF token, and sends a request to change the admin's password resulting in a full account takeover.
Title Cross-Site Request Forgery (CSRF) Leading to Account Takeover via SVG File Upload
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 8.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:H/VI:L/VA:N/SC:H/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Gridware

Published:

Updated: 2025-12-17T23:35:17.515Z

Reserved: 2025-12-07T00:38:32.831Z

Link: CVE-2025-14202

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-12-18T00:16:21.493

Modified: 2025-12-18T00:16:21.493

Link: CVE-2025-14202

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.