CVE-2025-61417
Description
Cross-Site Scripting (XSS) vulnerability exists in TastyIgniter 3.7.7, affecting the /admin/media_manager component. Attackers can upload a malicious SVG file containing JavaScript code. When an administrator previews the file, the code executes in their browser context, allowing the attacker to perform unauthorized actions such as modifying the admin account credentials.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
TastyIgniter 3.7.7 contains a stored XSS vulnerability in the admin media manager, allowing attackers to upload malicious SVG files that execute JavaScript when previewed by an administrator, leading to full account takeover.
Vulnerability
Overview
CVE-2025-61417 is a stored cross-site scripting (XSS) vulnerability in TastyIgniter 3.7.7, specifically within the /admin/media_manager component. The root component. The root cause is the lack of proper sanitization of uploaded SVG files, which can contain arbitrary JavaScript. When an administrator previews such a file in the media manager interface, the embedded script executes in the context of the admin's browser session [1][2].
Exploitation
Prerequisites and Attack Vector
An attacker must first have the ability to upload files to the media manager, which typically requires an authenticated account with upload privileges. The attack is remote and does not require user interaction beyond the administrator previewing the malicious file. The provided proof-of-concept demonstrates a crafted SVG that, upon preview, sends an authenticated PATCH request to /admin/staffs/account with headers such as X-Requested-With and X-IGNITER-REQUEST-HANDLER, effectively modifying the admin account's credentials [2].
Impact
Successful exploitation allows the attacker to change the administrator's username, email, and password, resulting in full administrative account takeover. Given the high privileges of an admin account, this can lead to complete compromise of the TastyIgniter application, including access to customer data, order management, and system configuration. The CVSS v3.1 base score is 8.8 (High) with the vector AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H [2].
Mitigation
Status
As of the publication date, TastyIgniter 3.7.7 is the affected version. The vendor's GitHub repository indicates that security vulnerabilities can be reported via email, but no official patch or advisory has been released yet [3]. Users are advised to restrict upload permissions to trusted administrators only, avoid previewing untrusted SVG files, and monitor for updates from the vendor.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
tastyigniter/tastyigniterPackagist | <= 3.7.7 | — |
Affected products
2- TastyIgniter/TastyIgniterdescription
- Range: =3.7.7
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.