The file preview functionality in Jirafeau < 4.4.0, which is enabled by default, could be exploited for cross site scripting. An attacker could upload image/svg+xml files containing JavaScript. When someone visits the File Preview URL for this file, the JavaScript inside of this image/svg+xml file will be executed in the users' browser.
| Software | From | Fixed in |
|---|---|---|
| jirafeau / jirafeau | - | 4.4.0 |
mojo42 / jirafeau
|
- | 4.4.0 |