CVE-2025-10348
BaseFortify
Publication date: 2025-10-30
Last updated on: 2025-10-30
Assigner: CERT.PL
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| eveo | urve_smart_office | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Stored Cross-Site Scripting (XSS) issue in the URVE Smart Office application, specifically in the report problem functionality. An attacker with a low-privileged account can upload an SVG file that contains malicious code. When another user visits the URL of this uploaded SVG resource, the malicious payload executes in their browser. The resource is publicly accessible without authentication, increasing the risk of exploitation.
How can this vulnerability impact me? :
The vulnerability can lead to execution of malicious scripts in the browsers of users who visit the uploaded SVG resource URL. This can result in theft of sensitive information, session hijacking, or other malicious actions performed on behalf of the victim user. Since the resource is accessible without authentication, anyone can be targeted, potentially compromising user data and trust.
What immediate steps should I take to mitigate this vulnerability?
Upgrade URVE Smart Office to version 1.1.24 or later, where the vulnerability has been fixed. Additionally, restrict the ability of low-privileged users to upload SVG files or any files that can contain executable payloads, and consider implementing authentication to access uploaded resources to prevent unauthorized access.