First published: Mon Feb 03 2025(Updated: )
An XSS issue was discovered in Backdrop CMS 1.28.x before 1.28.5 and 1.29.x before 1.29.3. It does not sufficiently validate uploaded SVG images to ensure they do not contain potentially dangerous SVG tags. SVG images can contain clickable links and executable scripting, and using a crafted SVG, it is possible to execute scripting in the browser when an SVG image is viewed. This issue is mitigated by the attacker needing to be able to upload SVG images, and that Backdrop embeds all uploaded SVG images within <img> tags, which prevents scripting from executing. The SVG must be viewed directly by its URL in order to run any embedded scripting.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Backdrop | <1.28.5 | |
Backdrop | <1.29.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-25063 is classified as a high severity vulnerability due to the potential for Cross-Site Scripting (XSS) exploitation.
To fix CVE-2025-25063, upgrade Backdrop CMS to version 1.28.5 or 1.29.3 or later.
CVE-2025-25063 affects Backdrop CMS versions 1.28.x before 1.28.5 and 1.29.x before 1.29.3.
CVE-2025-25063 can enable Cross-Site Scripting (XSS) attacks, allowing attackers to execute scripts in the context of a user's browser.
The main issue in CVE-2025-25063 is inadequate validation of uploaded SVG images, which may allow them to contain dangerous SVG tags.