Description
FileRise is a self-hosted web-based file manager with multi-file upload, editing, and batch operations. Prior to 2.2.3, a stored cross-site scripting (XSS) vulnerability exists in the Filerise application due to improper handling of uploaded SVG files. The application accepts user-supplied SVG uploads without sanitizing or restricting embedded script content. When a malicious SVG containing inline JavaScript or event-based payloads is uploaded, it is later rendered directly in the browser whenever viewed within the application. Because SVGs are XML-based and allow scripting, they execute in the origin context of the application, enabling full stored XSS. This vulnerability is fixed in 2.2.3.
References (2)
Core 2
Core References
Vendor Advisory, Exploit x_refsource_confirm
https://github.com/error311/FileRise/security/advisories/GHSA-qrcv-vjvf-fr29
Scores
CVSS v3
4.6
EPSS
0.0001
EPSS Percentile
3.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-79
Status
published
Products (1)
filerise/filerise
< 2.2.3
Published
Dec 01, 2025
Tracked Since
Feb 18, 2026