Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 28 Oct 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 28 Oct 2025 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Elabftw
Elabftw elabftw |
|
| Vendors & Products |
Elabftw
Elabftw elabftw |
Mon, 27 Oct 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | eLabFTW is an open source electronic lab notebook for research labs. The application served uploaded SVG files inline. Because SVG supports active content, an attacker could upload a crafted SVG that executes script when viewed, resulting in stored XSS under the application origin. A victim who opens the SVG URL or any page embedding it could have their session hijacked, data exfiltrated, or actions performed on their behalf. This vulnerability is fixed n 5.3.0. | |
| Title | eLabFTW HTML / CSS Injection via Malicious SVG Upload Leads to Credential Theft / Clickjacking | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-10-28T15:05:40.686Z
Reserved: 2025-10-22T18:55:48.011Z
Link: CVE-2025-62793
Updated: 2025-10-28T15:05:34.718Z
Status : Deferred
Published: 2025-10-27T22:15:42.307
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-62793
No data.
OpenCVE Enrichment
Updated: 2025-10-28T10:24:28Z