CVE-2023-53890
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-15

Last updated on: 2025-12-18

Assigner: VulnCheck

Description
Perch CMS 3.2 contains a stored cross-site scripting vulnerability that allows authenticated users to upload malicious SVG files with embedded JavaScript. Attackers can craft SVG files with script tags that execute when the file is viewed, potentially stealing user session information or performing client-side attacks.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-15
Last Modified
2025-12-18
Generated
2026-05-07
AI Q&A
2025-12-15
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
edgeofmyseat perch 3.2
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2023-53890 is a stored cross-site scripting (XSS) vulnerability in Perch CMS version 3.2. Authenticated users can upload malicious SVG files that contain embedded JavaScript code. When these SVG files are viewed, the embedded scripts execute in the context of the user's browser. This happens because the application does not properly sanitize or validate the SVG file contents before storing and serving them, allowing the malicious scripts to run. [1, 3]


How can this vulnerability impact me? :

This vulnerability can allow attackers to execute arbitrary JavaScript in the browsers of users who view the malicious SVG files. This can lead to theft of user session information, unauthorized actions performed on behalf of the user, and other client-side attacks that compromise user security and privacy. [1, 3]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

To detect this vulnerability, you can check for the presence of uploaded SVG files containing embedded JavaScript code on your Perch CMS 3.2 installation. Specifically, look for SVG files in the upload directories (e.g., /perch/resources/) that include <script> tags or JavaScript payloads. Commands to find such files on a Linux server might include: 1) Searching for SVG files: `find /path/to/perch/resources/ -name '*.svg'` 2) Grepping for script tags inside SVG files: `grep -l '<script' /path/to/perch/resources/*.svg` 3) Reviewing recent uploads or changes to SVG files by date: `find /path/to/perch/resources/ -name '*.svg' -mtime -7` to check files modified in the last 7 days. Additionally, monitoring web server logs for requests to SVG files that trigger suspicious client-side behavior may help. Note that detection requires authenticated access to the CMS to verify upload activity and file contents. [3]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include: 1) Restrict or disable SVG file uploads for authenticated users until a patch or fix is applied. 2) Implement server-side validation and sanitization of SVG files to remove any embedded JavaScript or script tags before storing or serving them. 3) Educate users to avoid uploading SVG files containing scripts. 4) Monitor and remove any existing malicious SVG files from the server. 5) Apply any available security updates or patches from the vendor once released. 6) Consider adding Content Security Policy (CSP) headers to limit script execution from untrusted sources. Since the vulnerability requires authenticated user upload, reviewing user permissions and access controls can also reduce risk. [1, 3]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart