Impact
The vulnerability lies in FUEL CMS's asset upload feature, where SVG files are not properly sanitized. A low‑privileged authenticated user can upload a crafted SVG containing malicious code.
Affected Systems
Installations running FUEL CMS version 1.5.2 or earlier are affected. The flaw is present in the asset upload functionality used throughout the admin interface and any pages that display uploaded SVG assets.
Risk and Exploitability
The CVSS score of 5.4 indicates a moderate impact. EPSS is not provided, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires only a low‑privileged authenticated account that can upload a crafted SVG. The description states that the application fails to sanitize SVG files, but it does not explicitly mention how or whether the malicious script is executed when the file is viewed. Based on typical XSS behavior in web applications, it is inferred that rendering a malicious SVG would execute the embedded script in the viewer’s browser, but this inference is not confirmed by the supplied description.
OpenCVE Enrichment