Description
efw4.X is an Enterprise Framework for Web. Prior to 4.08.010, the previewServlet serves files with their detected MIME type based on file extension, without any content sanitization or security headers. Files with .html, .htm, or .svg extensions are served as text/html or image/svg+xml respectively, causing any embedded JavaScript to execute in the victim's browser within the application's origin. This vulnerability is fixed in 4.08.010.
Published: 2026-05-12
Score: 4.6 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The previewServlet in efw4.X returns uploaded files using the MIME type inferred from the file extension with no content sanitization or security headers. When a file with a .html, .htm, or .svg extension contains embedded JavaScript, that code is served as text/html or image/svg+xml and in the victim’s browser within the application’s origin. This allows an attacker to run arbitrary JavaScript against users of the web application, facilitating the theft of session data, credential phishing, or other malicious actions. The flaw is classified as a stored cross‑site scripting vulnerability (CWE‑80) and carries a CVSS score of 4.6.

Affected Systems

efwGrp:efw4.X framework, specifically all releases earlier than 4.08.010, is impacted by this issue. Versions 4.08.010 and later contain the remediation.

Risk and Exploitability

The CVSS score of 4.6 denotes moderate severity, and the EPSS score is not available, so the likelihood of exploitation is uncertain. The vulnerability is not listed in the CISA KEV catalog. Attackers would need the ability to upload or modify a file that will be served by previewServlet, typically requiring a user with upload permissions or administrative access. Once the malicious file is accessible, any authenticated or unauthenticated user browsing that file will have the embedded JavaScript executed under the domain of the application, enabling a range of client‑side attacks. Because the vector relies on file upload and file‑preview functionality, the exposure is limited to environments that expose previewServlet to users and allow the upload of the offending file types.

Generated by OpenCVE AI on May 12, 2026 at 22:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade efw4.X to version 4.08.010 or later to fix the issue.
  • If upgrading is not possible, block or sanitize uploads of .html, .htm, and .svg files and enforce stricter MIME type validation.
  • Configure the servlet to set security headers such as X-Content-Type-Options: nosniff and disable the delivery of dangerous MIME types.

Generated by OpenCVE AI on May 12, 2026 at 22:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 21:30:00 +0000

Type Values Removed Values Added
Description efw4.X is an Enterprise Framework for Web. Prior to 4.08.010, the previewServlet serves files with their detected MIME type based on file extension, without any content sanitization or security headers. Files with .html, .htm, or .svg extensions are served as text/html or image/svg+xml respectively, causing any embedded JavaScript to execute in the victim's browser within the application's origin. This vulnerability is fixed in 4.08.010.
Title efw4.X: Stored XSS via previewServlet
Weaknesses CWE-80
References
Metrics cvssV3_1

{'score': 4.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-12T21:08:27.846Z

Reserved: 2026-05-05T16:33:55.844Z

Link: CVE-2026-44259

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-12T22:16:36.277

Modified: 2026-05-12T22:16:36.277

Link: CVE-2026-44259

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T23:00:12Z

Weaknesses