-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from two code patterns in camaleon_cms_uploader.rb: 1) Lines 105-106 show format-based extension whitelisting, where 'documents' format permits HTML uploads. 2) Lines 110-111 handle unsupported formats by falling back to default extensions, which can be exploited by injecting arbitrary formats. These functions lack proper validation of user-controlled 'format' parameters and fail to enforce content-disposition headers for unsafe file types, enabling XSS via malicious file uploads. The direct code references in the advisory and the described attack vector (parameter manipulation) confirm these functions' roles in the vulnerability.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| camaleon_cms | rubygems | < 2.8.1 | 2.8.1 |
Ongoing coverage of React2Shell