CVE-2025-67438

Medium
|6.1
No Exploit

Plain English Summary

AI-powered analysis for quick understanding

An attacker can execute harmful JavaScript in a victim's browser by uploading a specially crafted SVG file, which can steal sensitive information like session cookies. This requires the attacker to be logged in to the Sync-in Server, making it a threat primarily to authenticated users.

Technical Description

A Stored Cross-Site Scripting (XSS) vulnerability in Sync-in Server before 1.9.3 allows an authenticated attacker to execute arbitrary JavaScript in a victim's browser. By uploading a crafted SVG file containing a malicious payload, an attacker can access and exfiltrate sensitive information, including the user's session cookies.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
Confidentiality ImpactLow
Integrity ImpactLow
Availability ImpactNone
ScopeChanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$862($500-$1K)
Vendor Response
Grade APatched in 3 days

Quick Information

Published

Feb 20, 2026

about 2 months ago

Last Modified

Feb 23, 2026

about 1 month ago