In PageKit v1.0.18, a user can upload SVG files in the file upload portion of the CMS. These SVG files can contain malicious scripts. This file will be uploaded to the system and it will not be stripped or filtered. The user can create a link on the website pointing to "/storage/exp.svg" that will point to http://localhost/pagekit/storage/exp.svg. When a user comes along to click that link, it will trigger a XSS attack.
                
            Metrics
Affected Vendors & Products
Advisories
    | Source | ID | Title | 
|---|---|---|
  EUVD | 
                EUVD-2021-1362 | In PageKit v1.0.18, a user can upload SVG files in the file upload portion of the CMS. These SVG files can contain malicious scripts. This file will be uploaded to the system and it will not be stripped or filtered. The user can create a link on the website pointing to "/storage/exp.svg" that will point to http://localhost/pagekit/storage/exp.svg. When a user comes along to click that link, it will trigger a XSS attack. | 
  Github GHSA | 
                GHSA-mrwr-2945-fr22 | Cross-site scripting in PageKit | 
Fixes
    Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
        | Link | Providers | 
|---|---|
| https://github.com/pagekit/pagekit/issues/963 | 
                     | 
            
History
                    No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T23:17:29.162Z
Reserved: 2021-05-07T00:00:00
Link: CVE-2021-32245
No data.
Status : Modified
Published: 2021-06-16T21:15:08.173
Modified: 2024-11-21T06:06:54.960
Link: CVE-2021-32245
No data.
                        OpenCVE Enrichment
                    No data.
 EUVD
 Github GHSA