Impact
The vulnerability is a stored cross‑site scripting flaw located in the file preview feature of QuickDrop. It allows an attacker to upload an SVG file via the /api/file/upload‑chunk endpoint that contains embedded JavaScript. When any user opens the preview, the script executes in the context of the application’s domain, which can lead to session hijacking, data theft or defacement. This weakness is classified as CWE‑79.
Affected Systems
The flaw affects all installations of RoastSlav QuickDrop that are running a version older than 1.5.3.
Risk and Exploitability
The CVSS base score of 5.3 indicates medium severity, and the CVE is not currently listed in CISA’s KEV catalog. Because the exploit requires only the ability to upload a file, an attacker can trigger the payload by tricking a user into opening a malicious preview or by compromising an account with upload privileges. The lack of an EPSS score means we have no precise measure of exploit prevalence, but the straightforward upload mechanism suggests a moderate likelihood of exploitation.
OpenCVE Enrichment