CVE-2026-25100
Received Received - Intake
Stored XSS in Bludit Image Upload Allows Remote Code Execution

Publication date: 2026-03-27

Last updated on: 2026-04-01

Assigner: CERT.PL

Description
Bludit is vulnerable to Stored Cross-Site Scripting (XSS) in its image upload functionality. An authenticated attacker with content upload privileges (such as Author, Editor, or Administrator) can upload an SVG file containing a malicious payload, which is executed when a victim visits the URL of the uploaded resource. The uploaded resource itself is accessible without authentication. The vendor was notified early about this vulnerability, but stopped responding in the middle of coordination. All versions up to 3.18.2 are considered to be vulnerable, future versions might also be vulnerable.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-27
Last Modified
2026-04-01
Generated
2026-05-07
AI Q&A
2026-03-27
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
bludit bludit to 3.18.2 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in Bludit is a Stored Cross-Site Scripting (XSS) issue found in its image upload functionality.

An authenticated attacker who has content upload privileges, such as an Author, Editor, or Administrator, can upload an SVG file that contains malicious code.

When a victim visits the URL of the uploaded SVG resource, the malicious payload is executed.

The uploaded malicious resource is accessible without authentication, increasing the risk of exploitation.


How can this vulnerability impact me? :

This vulnerability can allow attackers to execute malicious scripts in the context of users visiting the affected Bludit site.

Potential impacts include theft of user session data, defacement of the website, redirection to malicious sites, or other malicious actions performed on behalf of the victim.

Since the malicious SVG file is accessible without authentication, any visitor to the site could be affected.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by identifying if your Bludit installation allows authenticated users with content upload privileges to upload SVG files. Since the vulnerability involves stored Cross-Site Scripting (XSS) via malicious SVG uploads, detection involves checking for the presence of SVG files uploaded by users with roles such as Author, Editor, or Administrator.

You can search your Bludit upload directories for SVG files that might contain malicious payloads. For example, on the server hosting Bludit, you can run commands to find SVG files and inspect their contents.

  • Find all SVG files in the upload directory (replace /path/to/bludit/uploads with the actual path): find /path/to/bludit/uploads -type f -name '*.svg'
  • Inspect suspicious SVG files for embedded scripts or suspicious content, for example using grep: grep -i '<script' /path/to/bludit/uploads/**/*.svg
  • Check web server logs for requests to SVG files that might indicate exploitation attempts.

Additionally, monitoring user activity for uploads of SVG files by authenticated users with upload privileges can help detect attempts to exploit this vulnerability.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting or disabling the upload of SVG files by authenticated users with content upload privileges, as SVG files can contain malicious scripts.

If disabling SVG uploads is not feasible, implement strict validation and sanitization of uploaded SVG files to remove any embedded scripts or malicious payloads before allowing them to be stored or served.

Upgrade Bludit to the latest version beyond 3.18.2 if available, as versions up to 3.18.2 are confirmed vulnerable. Monitor the vendor's releases for patches addressing this issue.

Limit user roles that have upload privileges to trusted users only, and monitor uploads closely.

Consider implementing Content Security Policy (CSP) headers to reduce the impact of potential XSS attacks.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows an authenticated attacker with content upload privileges to upload a malicious SVG file that executes a stored cross-site scripting (XSS) attack when accessed. This can lead to unauthorized script execution and potential data exposure or manipulation.

Such vulnerabilities can impact compliance with standards like GDPR and HIPAA because they may lead to unauthorized access or disclosure of personal or sensitive data, violating data protection and privacy requirements.

However, the provided information does not explicitly detail the direct compliance impact or specific regulatory breaches caused by this vulnerability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart