VYPR
Medium severity5.4NVD Advisory· Published Apr 28, 2026· Updated Apr 28, 2026

CVE-2026-38948

CVE-2026-38948

Description

Cross-Site Scripting (XSS) vulnerability exists in FUEL CMS v1.5.2 and before within the asset upload functionality. The application fails to properly sanitize uploaded SVG files, allowing a low-privileged authenticated user to upload a crafted SVG file containing malicious code.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS in FUEL CMS v1.5.2 asset upload allows low-privileged users to upload malicious SVG files, leading to admin account takeover via CSRF token theft.

Vulnerability

Overview

A stored Cross-Site Scripting (XSS) vulnerability exists in FUEL CMS version 1.5.2 and earlier within the asset upload functionality. The application fails to properly sanitize uploaded SVG files, allowing embedded JavaScript to persist on the server. This issue is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation) and CWE-434 (Unrestricted Upload of File with Dangerous Type) [1].

Exploitation

Details

An authenticated low-privileged user can upload a crafted SVG file containing malicious JavaScript. When an administrator subsequently views or previews the uploaded SVG file, the embedded script executes in the administrator's authenticated browser session. The script fetches the administrator's profile page to extract the CSRF token, then uses that token to submit a form that changes the administrator's username, email, and password [1].

Impact

Successful exploitation results in full administrator account takeover, granting the attacker complete control over the FUEL CMS instance. The official CVSS v3 score is 5.4 (Medium), though the researcher's analysis assigns a score of 7.1 (High) due to the high impact on confidentiality, integrity, and availability [1].

Mitigation

Status

As of the publication date, no official patch has been released. Mitigation requires sanitizing SVG uploads by stripping script elements or restricting allowed file types to non-executable formats. The vulnerability is not currently listed in CISA's Known Exploited Vulnerabilities catalog.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.