CVE ReportsPhraseanet Stored XSS: When Filenames Attack Vulnerability ID: CVE-2018-25157 CVSS Score:...
Vulnerability ID: CVE-2018-25157
CVSS Score: 6.4
Published: 2026-02-11
A classic Stored Cross-Site Scripting (XSS) vulnerability in Phraseanet Digital Asset Management (DAM) software versions 4.0.3 and earlier. By simply renaming a file to contain malicious HTML and JavaScript, an attacker can turn a standard asset upload into a persistent trap for administrators and other users. The flaw lies in the application's failure to sanitize filenames before rendering them in the DOM.
Authenticated users can upload files with malicious names (e.g., containing script tags) to Phraseanet. Because the application fails to sanitize these names upon display, the code executes in the browser of anyone viewing the file. Fixed in version 4.0.7.
4.0.7)4.0.7)Remediation Steps:
< , >, ", and '.unsafe-inline scripts to mitigate the impact of any missed XSS vectors.Read the full report for CVE-2018-25157 on our website for more details including interactive diagrams and full exploit analysis.