A vulnerability in the file upload at bookmark + asset rendering pipeline allows an attacker to upload a malicious SVG file with JavaScript content. When an authenticated admin user views the SVG file with embedded JavaScript code of shared bookmark, JavaScript executes in the admin’s browser, retrieves the CSRF token, and sends a request to change the admin's password resulting in a full account takeover.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 18 Dec 2025 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Linkding
Linkding linkding
Vendors & Products Linkding
Linkding linkding

Wed, 17 Dec 2025 23:45:00 +0000

Type Values Removed Values Added
Description A vulnerability in the file upload at bookmark + asset rendering pipeline allows an attacker to upload a malicious SVG file with JavaScript content. When an authenticated admin user views the SVG file with embedded JavaScript code of shared bookmark, JavaScript executes in the admin’s browser, retrieves the CSRF token, and sends a request to change the admin's password resulting in a full account takeover.
Title Cross-Site Request Forgery (CSRF) Leading to Account Takeover via SVG File Upload
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 8.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:H/VI:L/VA:N/SC:H/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Gridware

Published:

Updated: 2025-12-17T23:35:17.515Z

Reserved: 2025-12-07T00:38:32.831Z

Link: CVE-2025-14202

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-12-18T00:16:21.493

Modified: 2025-12-18T00:16:21.493

Link: CVE-2025-14202

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-18T09:55:24Z

Weaknesses