When using default XWiki configuration, it's possible for an attacker to upload an SVG containing a script executed when executing the download action on the file.
This problem has been patched so that the default configuration doesn't allow to display the SVG files in the browser.
This issue can be fixed without the patch by setting properly the configuration to download or display files, see: https://www.xwiki.org/xwiki/bin/view/Documentation/AdminGuide/Attachments#HAttachmentdisplayordownload
https://jira.xwiki.org/browse/XWIKI-18368
If you have any questions or comments about this advisory: * Open an issue in Jira * Email us at security ML
{ "severity": "MODERATE", "github_reviewed": true, "cwe_ids": [ "CWE-79" ], "github_reviewed_at": "2022-02-07T16:42:20Z", "nvd_published_at": "2022-02-04T23:15:00Z" }