CVE-2023-26771

Taskcafe 0.3.2 is vulnerable to Cross Site Scripting (XSS). There is a lack of validation in the filetype when uploading a SVG profile picture with a XSS payload on it. An authenticated attacker can exploit this vulnerability by uploading a malicious picture which will trigger the payload when the victim opens the file.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:taskcafe_project:taskcafe:0.3.2:*:*:*:*:*:*:*

History

27 May 2025, 19:26

Type Values Removed Values Added
References () https://bishopfox.com/blog/taskcafe-version-0-3-2-advisory - () https://bishopfox.com/blog/taskcafe-version-0-3-2-advisory - Exploit, Third Party Advisory
References () https://github.com/JordanKnott/taskcafe - () https://github.com/JordanKnott/taskcafe - Product
First Time Taskcafe Project taskcafe
Taskcafe Project
CPE cpe:2.3:a:taskcafe_project:taskcafe:0.3.2:*:*:*:*:*:*:*

Information

Published : 2024-10-04 19:15

Updated : 2025-05-27 19:26


NVD link : CVE-2023-26771

Mitre link : CVE-2023-26771

CVE.ORG link : CVE-2023-26771


JSON object : View

Products Affected

taskcafe_project

  • taskcafe
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')