{"api_version":"1","generated_at":"2026-04-17T15:14:18+00:00","cve":"CVE-2021-25978","urls":{"html":"https://cve.report/CVE-2021-25978","api":"https://cve.report/api/cve/CVE-2021-25978.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-25978","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-25978"},"summary":{"title":"CVE-2021-25978","description":"Apostrophe CMS versions between 2.63.0 to 3.3.1 are vulnerable to Stored XSS where an editor uploads an SVG file that contains malicious JavaScript onto the Images module, which triggers XSS once viewed.","state":"PUBLIC","assigner":"vulnerabilitylab@whitesourcesoftware.com","published_at":"2021-11-07 18:15:00","updated_at":"2021-11-09 18:21:00"},"problem_types":["CWE-79"],"metrics":[],"references":[{"url":"https://github.com/apostrophecms/apostrophe/commit/c8b94ee9c79468f1ce28e31966cb0e0839165e59","name":"https://github.com/apostrophecms/apostrophe/commit/c8b94ee9c79468f1ce28e31966cb0e0839165e59","refsource":"MISC","tags":[],"title":"sanitize SVG uploads, including previous uploads · apostrophecms/apostrophe@c8b94ee · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-25978","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-25978","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"Daniel Elkabes","lang":""}],"nvd_cpes":[{"cve_year":"2021","cve_id":"25978","vulnerable":"1","versionEndIncluding":"3.3.1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apostrophecms","cpe5":"apostrophecms","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"vulnerabilitylab@whitesourcesoftware.com","ID":"CVE-2021-25978","STATE":"PUBLIC","TITLE":"Apostrophe - XSS"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Apostrophe ","version":{"version_data":[{"version_affected":"<=","version_value":"3.3.1"},{"version_affected":">=","version_value":"2.63.0"}]}}]},"vendor_name":"Apostrophe "}]}},"credit":[{"lang":"eng","value":"Daniel Elkabes"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Apostrophe CMS versions between 2.63.0 to 3.3.1 are vulnerable to Stored XSS where an editor uploads an SVG file that contains malicious JavaScript onto the Images module, which triggers XSS once viewed."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.4,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-79 Cross-site Scripting (XSS)"}]}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://github.com/apostrophecms/apostrophe/commit/c8b94ee9c79468f1ce28e31966cb0e0839165e59","name":"https://github.com/apostrophecms/apostrophe/commit/c8b94ee9c79468f1ce28e31966cb0e0839165e59"}]},"solution":[{"lang":"eng","value":"Upgrade to version 3.4.0"}],"source":{"advisory":"https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25978","discovery":"EXTERNAL"}},"nvd":{"publishedDate":"2021-11-07 18:15:00","lastModifiedDate":"2021-11-09 18:21:00","problem_types":["CWE-79"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":5.4,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.3,"impactScore":2.7},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:N/I:P/A:N","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":3.5},"severity":"LOW","exploitabilityScore":6.8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apostrophecms:apostrophecms:*:*:*:*:*:*:*:*","versionStartIncluding":"2.63.0","versionEndIncluding":"3.3.1","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"25978","Ordinal":"200905","Title":"CVE-2021-25978","CVE":"CVE-2021-25978","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"25978","Ordinal":"1","NoteData":"Apostrophe CMS versions between 2.63.0 to 3.3.1 are vulnerable to Stored XSS where an editor uploads an SVG file that contains malicious JavaScript onto the Images module, which triggers XSS once viewed.","Type":"Description","Title":null},{"CveYear":"2021","CveId":"25978","Ordinal":"2","NoteData":"2021-11-07","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"25978","Ordinal":"3","NoteData":"2021-11-07","Type":"Other","Title":"Modified"}]}}}