Impact
A malicious SVG file can be uploaded through the profile picture form and is stored without proper sanitization. The stored file is rendered publicly by the application, allowing the embedded JavaScript to run in any user’s browser that visits the link. This capability can lead to session or token theft, account takeover, and exfiltration of sensitive data.
Affected Systems
Versions 3.15.2 and earlier of TypeBot from baptisteArno/typebot.io are affected. The vulnerability is fixed in version 3.16.0.
Risk and Exploitability
The CVSS score of 8.5 indicates a high severity risk. No EPSS score is available, but the stored nature of the flaw makes exploitation likely for attackers who can upload files. The vulnerability is not listed in the CISA KEV catalog. Successful exploitation requires uploading a crafted SVG file through the profile picture interface, after which the payload remains permanently accessible via a public link.
OpenCVE Enrichment