CVE-2018-16629
Description
panel/uploads/#elf_l1_XA in Subrion CMS v4.2.1 allows XSS via an SVG file with JavaScript in a SCRIPT element.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Subrion CMS v4.2.1 allows stored XSS via SVG file upload with embedded JavaScript, compromising admin panel security.
Vulnerability
Subrion CMS v4.2.1 [1] suffers from a stored cross-site scripting (XSS) vulnerability in the panel/uploads/#elf_l1_XA endpoint [4]. An authenticated administrator can upload an SVG file containing a ` element with arbitrary JavaScript [4]. When the SVG file is accessed directly (not embedded via ` tag), the script executes in the context of the admin panel [4].
Exploitation
To exploit this vulnerability, an attacker must have admin-level access to the Subrion CMS [4]. The attacker uploads a crafted SVG file through the file upload functionality in the panel [4]. Once uploaded, any user opening the file (e.g., by clicking on it) triggers the embedded JavaScript [4]. No additional user interaction is required beyond opening the file.
Impact
Successful exploitation allows an attacker to execute arbitrary JavaScript in the admin panel domain [4]. This can lead to session hijacking, theft of admin credentials, or further compromise of the CMS, potentially enabling full site takeover [1][4].
Mitigation
The vulnerability has been fixed in Subrion CMS commit fbc29ddb29e9c9732695e25ad2c22e038eed6385 [2]. Users should upgrade to a version containing this fix (likely after 4.2.1) or apply the patch manually [2]. No workaround has been disclosed for unpatched installations.
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
intelliants/subrionPackagist | <= 4.2.1 | — |
Affected products
1Patches
11 file changed · +1 −1
uploads/.htaccess+1 −1 modified@@ -8,7 +8,7 @@ Options -ExecCGI # Deny files access for some file extensions -<FilesMatch "(?i)\.(php|php5|php4|php3|php2|phtml|pl|py|jsp|asp|htm|html|shtml|sh|cgi)$"> +<FilesMatch "(?i)\.(php|php5|php4|php3|php2|phtml|pl|py|jsp|asp|htm|html|shtml|sh|cgi|svg)$"> ForceType text/plain Order Deny,Allow Deny from All
Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5- github.com/advisories/GHSA-mxv3-qcmf-r6wjghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2018-16629ghsaADVISORY
- github.com/intelliants/subrion/commit/fbc29ddb29e9c9732695e25ad2c22e038eed6385ghsaWEB
- github.com/intelliants/subrion/issues/777ghsaWEB
- github.com/security-breachlock/CVE-2018-16629/blob/master/subrion_cms.pdfghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.