CVE-2025-41087
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-11-24

Last updated on: 2025-11-24

Assigner: Spanish National Cybersecurity Institute, S.A. (INCIBE)

Description
Cross-Site Scripting (XSS) vulnerability stored in tha Taclia web application, where the uploaded SVG images are not properly sanitized. This allows to the attackers to embed malicious scripts in SVG files such as image profiles, which are then stored on the server and executed in the context of any user who accesses the compromised resource.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-24
Last Modified
2025-11-24
Generated
2026-05-06
AI Q&A
2025-11-24
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
incibe taclia *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-41087 is a stored Cross-Site Scripting (XSS) vulnerability in the Taclia web application. It occurs because uploaded SVG images are not properly sanitized, allowing attackers to embed malicious scripts within these SVG files. These malicious scripts are stored on the server and executed in the browser context of any user who accesses the compromised SVG resource, potentially leading to unauthorized actions or data exposure. [1]


How can this vulnerability impact me? :

This vulnerability can impact users by allowing attackers to execute malicious scripts in their browsers when they access compromised SVG images on the Taclia platform. This can lead to unauthorized actions performed on behalf of the user, theft of sensitive information, session hijacking, or other malicious activities that compromise user security and privacy. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of this vulnerability involves checking for uploaded SVG files that contain embedded scripts. Since the vulnerability is due to improper sanitization of SVG images, you can scan the server directories where profile images or uploaded SVG files are stored for suspicious script tags within SVG files. For example, you can use the following command to find SVG files containing <script> tags: grep -r --include='*.svg' '<script' /path/to/uploaded/images. Additionally, monitoring web application logs for unusual script execution or unexpected user behavior when accessing SVG resources may help detect exploitation attempts. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include updating the Taclia web application to the latest version where this vulnerability has been fixed. Additionally, you should sanitize or remove any existing uploaded SVG files that may contain malicious scripts. Implement input validation and sanitization for uploaded SVG images to prevent embedded scripts from being stored. Restrict user permissions to limit the ability to upload files and monitor for suspicious uploads. If an update is not immediately possible, consider disabling SVG uploads temporarily or filtering SVG content to remove script elements. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart