VYPR
Moderate severityNVD Advisory· Published Dec 4, 2018· Updated Aug 5, 2024

CVE-2018-16629

CVE-2018-16629

Description

panel/uploads/#elf_l1_XA in Subrion CMS v4.2.1 allows XSS via an SVG file with JavaScript in a SCRIPT element.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Subrion CMS v4.2.1 allows stored XSS via SVG file upload with embedded JavaScript, compromising admin panel security.

Vulnerability

Subrion CMS v4.2.1 [1] suffers from a stored cross-site scripting (XSS) vulnerability in the panel/uploads/#elf_l1_XA endpoint [4]. An authenticated administrator can upload an SVG file containing a ` element with arbitrary JavaScript [4]. When the SVG file is accessed directly (not embedded via ` tag), the script executes in the context of the admin panel [4].

Exploitation

To exploit this vulnerability, an attacker must have admin-level access to the Subrion CMS [4]. The attacker uploads a crafted SVG file through the file upload functionality in the panel [4]. Once uploaded, any user opening the file (e.g., by clicking on it) triggers the embedded JavaScript [4]. No additional user interaction is required beyond opening the file.

Impact

Successful exploitation allows an attacker to execute arbitrary JavaScript in the admin panel domain [4]. This can lead to session hijacking, theft of admin credentials, or further compromise of the CMS, potentially enabling full site takeover [1][4].

Mitigation

The vulnerability has been fixed in Subrion CMS commit fbc29ddb29e9c9732695e25ad2c22e038eed6385 [2]. Users should upgrade to a version containing this fix (likely after 4.2.1) or apply the patch manually [2]. No workaround has been disclosed for unpatched installations.

AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
intelliants/subrionPackagist
<= 4.2.1

Affected products

1

Patches

1
fbc29ddb29e9

Resolves #777

https://github.com/intelliants/subrionDaiyrbek ArtelovAug 15, 2018via ghsa
1 file changed · +1 1
  • uploads/.htaccess+1 1 modified
    @@ -8,7 +8,7 @@
     Options -ExecCGI
     
     # Deny files access for some file extensions
    -<FilesMatch "(?i)\.(php|php5|php4|php3|php2|phtml|pl|py|jsp|asp|htm|html|shtml|sh|cgi)$">
    +<FilesMatch "(?i)\.(php|php5|php4|php3|php2|phtml|pl|py|jsp|asp|htm|html|shtml|sh|cgi|svg)$">
         ForceType text/plain
         Order Deny,Allow
         Deny from All
    

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

5

News mentions

0

No linked articles in our index yet.