CVE-2020-15275: malicious SVG attachment causing stored XSS vulnerability
8.7
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.52709%
CWE
Published
11/11/2020
Updated
10/7/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
moin | pip | < 1.9.11 | 1.9.11 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from SVG files not being properly sanitized or protected against inline execution. The commit diff shows 'image/svg+xml' was added to 'mimetypes_xss_protect' in MoinMoin/config/multiconfig.py. This list determines which MIME types trigger XSS protections (like forcing download instead of inline rendering). The absence of SVG in this list prior to the patch meant uploaded SVGs were rendered inline, enabling XSS. The DefaultConfig.init method initializes this critical security configuration, making it the root cause.