CVE-2022-32115: Known vulnerable to code execution via SVG file in v1.3.1
6.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.71145%
CWE
Published
7/9/2022
Updated
1/27/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| idno/known | composer | <= 1.3.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper SVG validation in isSVG(). The function's original implementation (pre-patch) only checked for '.svg' file extensions rather than validating actual content. The researcher blog shows attackers could upload SVG files containing <script> tags or PHP code. The GitHub commit adds isFileFreeFromScriptTags() to address this, confirming the lack of content validation in the original isSVG() implementation. CWE-79 classification and CVE description both point to improper input neutralization in web content generation via SVG processing.