CVE-2025-66939
Cross-Site Scripting in 66biolinks via Malicious Favicon
Publication date: 2026-01-12
Last updated on: 2026-01-12
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| altumcode | 66biolinks | 61.0.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-66939 is a Cross-Site Scripting (XSS) vulnerability in 66biolinks by AltumCode version 61.0.1. It arises because the application allows users to upload SVG files as favicons without properly sanitizing certain HTML elements within those SVGs, specifically <a> (anchor) and <image> tags. Although JavaScript execution is blocked, these unfiltered tags enable attackers to inject stored HTML content that can manipulate the user interface, load external resources for tracking, create phishing links, and leak referrer information. This means an attacker can craft a favicon SVG that, when viewed by others, can display deceptive content or cause external requests, posing security risks. [2]
How can this vulnerability impact me? :
This vulnerability can impact you by allowing attackers to inject deceptive UI elements or links into your bio link pages via malicious SVG favicons. It can enable phishing attacks by embedding attacker-controlled URLs in trusted UI contexts, track users by loading external resources, and leak sensitive referrer information. Although JavaScript execution is prevented, the stored HTML injection can still mislead users, compromise trust, and potentially expose user data or internal URLs to third parties. [2]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring for SVG favicon files uploaded to the 66biolinks platform that contain unfiltered HTML elements such as <a> and <image> tags. Network detection can include observing outgoing requests triggered by these SVG favicons to external domains, which may indicate exploitation attempts. For example, using network monitoring tools like tcpdump or Wireshark to capture HTTP requests to unusual external domains when users visit biolink pages. A command example to capture such traffic could be: tcpdump -i any -n host not yourdomain.com and port 80 or 443. Additionally, inspecting uploaded SVG files for embedded <a> or <image> tags can be done by searching the SVG content for these tags, e.g., using grep: grep -E '<a|<image' uploaded_favicon.svg. These methods help identify potentially malicious SVG favicons exploiting the vulnerability. [2]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include strictly sanitizing all uploaded SVG favicon files by removing HTML-capable elements such as <a> and <image> tags before allowing them to be used. Alternatively, convert uploaded SVG favicons into sanitized raster images like PNG or WebP to eliminate embedded HTML or JavaScript risks. Additionally, apply output encoding when rendering any user-supplied content inside profile pages to prevent injection attacks. Monitoring and restricting SVG uploads and ensuring that the platform is updated to a version that addresses this sanitization flaw are also recommended. [2]
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows attackers to inject deceptive UI elements, load external resources, and potentially track users via crafted SVG favicons. This can lead to unauthorized data exposure, phishing risks, and user tracking, which may violate privacy and data protection regulations such as GDPR and HIPAA by compromising user data confidentiality and integrity. Therefore, the vulnerability poses compliance risks with these standards unless properly mitigated. [2]