CVE-2021-47925
Description
CMDBuild 3.3.2 contains multiple stored cross-site scripting vulnerabilities that allow authenticated attackers to inject arbitrary web script or HTML via crafted input in card creation and file upload endpoints. Attackers can inject XSS payloads through Employee card parameters or SVG file attachments in the classes endpoint, which execute when other users view the affected records or preview attachments.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
CMDBuild 3.3.2 has multiple stored XSS vulnerabilities allowing authenticated attackers to inject arbitrary web script via crafted Employee card parameters or SVG file attachments.
Vulnerability
Overview
CMDBuild 3.3.2 contains multiple stored cross-site scripting (XSS) vulnerabilities that allow authenticated attackers to inject arbitrary web script or HTML. The root cause is improper neutralization of user-supplied input during web page generation (CWE-79) [4]. Attackers can inject payloads through Employee card parameters (e.g., Code, Surname, Name) or by uploading SVG file attachments in the classes endpoint [classes] endpoint [2].
Exploitation
An attacker with a low-privilege account can exploit these vulnerabilities. For the Employee card vector, the attacker adds a new Employee card and inserts XSS payloads into fields such as Code, Surname, or Name. When another user views the affected record or opens the relation graph, the payload executes [2]. For the file upload vector via file upload, the attacker uploads a crafted SVG file as an attachment to a Workplace card; the payload triggers when a victim previews the attachment or opens it in a new tab [2].
Impact
Successful exploitation allows an attacker to execute arbitrary JavaScript in the context of the victim's browser. This can lead to session hijacking, defacement, or theft of sensitive information displayed within the CMDBuild application. The CVSS v3 base score is 6.4 (Medium) [4], reflecting the need for authentication and user interaction.
Mitigation
The vendor has released CMDBuild 4.2.0, which addresses these vulnerabilities [3]. Users are strongly advised to upgrade to the latest version. No workarounds are documented in the available references.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.