VYPR
Low severityNVD Advisory· Published Oct 20, 2025· Updated Oct 20, 2025

CVE-2025-61417

CVE-2025-61417

Description

Cross-Site Scripting (XSS) vulnerability exists in TastyIgniter 3.7.7, affecting the /admin/media_manager component. Attackers can upload a malicious SVG file containing JavaScript code. When an administrator previews the file, the code executes in their browser context, allowing the attacker to perform unauthorized actions such as modifying the admin account credentials.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

TastyIgniter 3.7.7 contains a stored XSS vulnerability in the admin media manager, allowing attackers to upload malicious SVG files that execute JavaScript when previewed by an administrator, leading to full account takeover.

Vulnerability

Overview

CVE-2025-61417 is a stored cross-site scripting (XSS) vulnerability in TastyIgniter 3.7.7, specifically within the /admin/media_manager component. The root component. The root cause is the lack of proper sanitization of uploaded SVG files, which can contain arbitrary JavaScript. When an administrator previews such a file in the media manager interface, the embedded script executes in the context of the admin's browser session [1][2].

Exploitation

Prerequisites and Attack Vector

An attacker must first have the ability to upload files to the media manager, which typically requires an authenticated account with upload privileges. The attack is remote and does not require user interaction beyond the administrator previewing the malicious file. The provided proof-of-concept demonstrates a crafted SVG that, upon preview, sends an authenticated PATCH request to /admin/staffs/account with headers such as X-Requested-With and X-IGNITER-REQUEST-HANDLER, effectively modifying the admin account's credentials [2].

Impact

Successful exploitation allows the attacker to change the administrator's username, email, and password, resulting in full administrative account takeover. Given the high privileges of an admin account, this can lead to complete compromise of the TastyIgniter application, including access to customer data, order management, and system configuration. The CVSS v3.1 base score is 8.8 (High) with the vector AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H [2].

Mitigation

Status

As of the publication date, TastyIgniter 3.7.7 is the affected version. The vendor's GitHub repository indicates that security vulnerabilities can be reported via email, but no official patch or advisory has been released yet [3]. Users are advised to restrict upload permissions to trusted administrators only, avoid previewing untrusted SVG files, and monitor for updates from the vendor.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
tastyigniter/tastyigniterPackagist
<= 3.7.7

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.