Impact
Improper verification of cryptographic signatures in the SVG plugin of quick‑media allows malicious actors to supply forged signed content that the application will accept as valid. This signature‑bypass flaw (CWE‑347) can undermine the integrity guarantees of the system and potentially lead to unauthorized actions such as code execution or privilege escalation.
Affected Systems
The vulnerability impacts all releases of liuyueyi quick‑media before version 1.0, specifically the modules under plugins/svg-plugin/batik‑codec‑fix/src/main/java/org/apache/batik/ext/awt/image/codec/util that reference SeekableOutputStream.Java.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate severity, while an EPSS score of less than 1% suggests a low current likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector involves processing specially crafted SVG files or other signed data that can be supplied by an attacker, leading the application to accept and act upon forged inputs.
OpenCVE Enrichment
Github GHSA