First published: Tue Oct 22 2024(Updated: )
### Impact There is a potential risk of code execution for Backoffice users when they “preview” SVG files in full screen mode. ### Workarounds Server-side file validation is available to strip script tags from file's content during the file upload process.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
nuget/Umbraco.Cms | >=13.0.0<13.5.2 | 13.5.2 |
nuget/Umbraco.Cms | >=10.0.0<10.8.7 | 10.8.7 |
nuget/UmbracoCms | >=8.0.0<8.18.15 | 8.18.15 |
Umbraco CMS | >=8.0<8.18.15 | |
Umbraco CMS | >=10.0<10.8.7 | |
Umbraco CMS | >=13.0<13.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-48927 is considered a critical vulnerability due to the potential risk of code execution for Backoffice users.
To fix CVE-2024-48927, upgrade Umbraco CMS to versions 13.5.2, 10.8.7, or 8.18.15, which include security patches.
CVE-2024-48927 affects users of Umbraco CMS versions between 8.0.0 and 13.5.2.
CVE-2024-48927 enables an attack that potentially allows code execution when users preview SVG files in full screen mode.
A temporary workaround for CVE-2024-48927 is to implement server-side file validation to strip script tags during the file upload process.