CVE-2025-10253
Description
A vulnerability has been found in openDCIM 23.04. This vulnerability affects unknown code of the file /scripts/uploadifive.php of the component SVG File Handler. Such manipulation of the argument Filedata leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
openDCIM 23.04 contains a stored XSS vulnerability via SVG file upload in /scripts/uploadifive.php, allowing arbitrary script execution.
Vulnerability
Overview
A stored cross-site scripting (XSS) vulnerability exists in openDCIM version 23.04 within the SVG file handler component at /scripts/uploadifive.php. The application accepts .svg file uploads without sanitizing the file contents. Since SVG is an XML-based format, it can contain embedded JavaScript code. An attacker can craft a malicious SVG file containing JavaScript, upload it through the image management interface, and when the file is later viewed within the application, the script executes in the victim's browser [1].
Exploitation
An authenticated user can upload a malicious SVG file via the endpoint /image_management.php under Template Management > Device Image Management. The proof-of-concept demonstrates a simple SVG file with an embedded ` tag that triggers an alert. The attack requires authentication but no special privileges beyond the ability to upload device images. The uploaded file is stored and served from /assets/pictures/`, making it accessible to any user who views the image within the application.
Impact
Successful exploitation allows an attacker to execute arbitrary JavaScript in the context of any user who views the malicious SVG file. This can lead to theft of cookies, session tokens, or other sensitive data. If an administrator views the file, the attacker could potentially compromise privileged accounts. The CVSS v3 score is 3.5 (Low), though the reference notes a higher severity due to the potential for data theft and account compromise.
Mitigation
The vendor was contacted but did not respond. As of the publication date, no official patch is available. Recommended mitigations include blocking SVG uploads entirely, sanitizing uploaded SVG files to remove embedded JavaScript, and enforcing a strict Content Security Policy (CSP) to limit script execution.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.