The file preview functionality in Jirafeau < 4.4.0, which is enabled by default, could be exploited for cross site scripting. An attacker could upload image/svg+xml files containing JavaScript. When someone visits the File Preview URL for this file, the JavaScript inside of this image/svg+xml file will be executed in the users' browser.
| Package (Ecosystem) | Introduced | Fixed | Limit |
|---|---|---|---|
| mojo42/jirafeau(Packagist) | 0 | 4.4.0 | N/A |
CVSS Metrics