VYPR
Low severity3.5NVD Advisory· Published Sep 11, 2025· Updated Apr 29, 2026

CVE-2025-10253

CVE-2025-10253

Description

A vulnerability has been found in openDCIM 23.04. This vulnerability affects unknown code of the file /scripts/uploadifive.php of the component SVG File Handler. Such manipulation of the argument Filedata leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

openDCIM 23.04 contains a stored XSS vulnerability via SVG file upload in /scripts/uploadifive.php, allowing arbitrary script execution.

Vulnerability

Overview

A stored cross-site scripting (XSS) vulnerability exists in openDCIM version 23.04 within the SVG file handler component at /scripts/uploadifive.php. The application accepts .svg file uploads without sanitizing the file contents. Since SVG is an XML-based format, it can contain embedded JavaScript code. An attacker can craft a malicious SVG file containing JavaScript, upload it through the image management interface, and when the file is later viewed within the application, the script executes in the victim's browser [1].

Exploitation

An authenticated user can upload a malicious SVG file via the endpoint /image_management.php under Template Management > Device Image Management. The proof-of-concept demonstrates a simple SVG file with an embedded ` tag that triggers an alert. The attack requires authentication but no special privileges beyond the ability to upload device images. The uploaded file is stored and served from /assets/pictures/`, making it accessible to any user who views the image within the application.

Impact

Successful exploitation allows an attacker to execute arbitrary JavaScript in the context of any user who views the malicious SVG file. This can lead to theft of cookies, session tokens, or other sensitive data. If an administrator views the file, the attacker could potentially compromise privileged accounts. The CVSS v3 score is 3.5 (Low), though the reference notes a higher severity due to the potential for data theft and account compromise.

Mitigation

The vendor was contacted but did not respond. As of the publication date, no official patch is available. Recommended mitigations include blocking SVG uploads entirely, sanitizing uploaded SVG files to remove embedded JavaScript, and enforcing a strict Content Security Policy (CSP) to limit script execution.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.