VYPR
Moderate severityNVD Advisory· Published Nov 11, 2020· Updated Aug 4, 2024

malicious SVG attachment causing stored XSS vulnerability in MoinMoin

CVE-2020-15275

Description

MoinMoin is a wiki engine. In MoinMoin before version 1.9.11, an attacker with write permissions can upload an SVG file that contains malicious javascript. This javascript will be executed in a user's browser when the user is viewing that SVG file on the wiki. Users are strongly advised to upgrade to a patched version. MoinMoin Wiki 1.9.11 has the necessary fixes and also contains other important fixes.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

MoinMoin before 1.9.11 allows attackers with write permissions to upload SVG files containing malicious JavaScript, leading to stored XSS.

Vulnerability

This is a stored cross-site scripting (XSS) vulnerability. An attacker with write permissions can upload an SVG file containing malicious JavaScript to the wiki [1][2]. The SVG content is not properly sanitized, allowing arbitrary script execution when the file is loaded in a browser.

Exploitation

To exploit this, the attacker must have write access to the wiki. Once an SVG file with embedded JavaScript is uploaded, any user viewing that SVG file will have the script executed in their browser [1][2]. No additional user interaction is required beyond viewing the page containing the SVG media.

Impact

Successful exploitation allows the attacker to execute arbitrary JavaScript in the context of the victim's browser session [1]. This can lead to session hijacking, defacement, or exfiltration of sensitive information visible to the authenticated user. The attack requires no authentication beyond existing wiki write permissions.

Mitigation

MoinMoin Wiki version 1.9.11 includes the necessary fixes for this vulnerability [1][3]. Users are strongly advised to upgrade immediately. No workarounds other than disabling SVG uploads or restricting write permissions are available [1].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
moinPyPI
< 1.9.111.9.11

Affected products

3

Patches

1
31de9139d0aa

Merge pull request from GHSA-4q96-6xhq-ff43

2 files changed · +2 1
  • MoinMoin/config/__init__.py+1 1 modified
    @@ -12,7 +12,7 @@
     from MoinMoin.util.chartypes import *
     
     # List of image types browser do support regulary
    -browser_supported_images = ('gif', 'jpg', 'jpeg', 'png', 'bmp', 'ico', )
    +browser_supported_images = ('gif', 'jpg', 'jpeg', 'png', 'bmp', 'ico', 'svg+xml')
     
     # Parser to use mimetype text
     parser_text_mimetype = ('plain', 'csv', 'rst', 'docbook', 'latex', 'tex', 'html', 'css',
    
  • MoinMoin/config/multiconfig.py+1 0 modified
    @@ -1143,6 +1143,7 @@ def __init__(self, exprstr):
         ('mimetypes_xss_protect',
          [
            'text/html',
    +       'image/svg+xml',
            'application/x-shockwave-flash',
            'application/xhtml+xml',
          ],
    

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

8

News mentions

0

No linked articles in our index yet.