-
CVSS Score
-The vulnerability stemmed from two key functions handling SVG uploads without sanitization. The storm repository's File::putFile() and winter's UploadableWidget::onUploadDirect() both processed SVG files before the patches added Svg::extract() sanitization. These functions were directly modified in the referenced security patches to add SVG filtering, confirming their role in the vulnerability chain. The functions' responsibility for writing uploaded files to storage without content inspection matches the vulnerability description of unsanitized SVG handling.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| wintercms/winter | composer | < 1.2.3 | 1.2.3 |
A Semantic Attack on Google Gemini - Read the Latest Research