The file preview functionality in Jirafeau < 4.4.0, which is enabled by default, could be exploited for cross site scripting. An attacker could upload image/svg+xml files containing JavaScript. When someone visits the File Preview URL for this file, the JavaScript inside of this image/svg+xml file will be executed in the users' browser.
{ "nvd_published_at": "2022-05-17T14:15:00Z", "github_reviewed_at": "2022-06-02T15:52:33Z", "severity": "MODERATE", "github_reviewed": true, "cwe_ids": [ "CWE-79" ] }