Skip to content

Conversation

@legacy-git
Copy link

Updates

  • Affected products
  • CVSS v3
  • CVSS v4
  • Severity

Comments
Hi there!

I represent the security team at Umbraco HQ, and I have reviewed CVE-2025-67288 internally. I can conclude that this advisory describes a vulnerability that is already documented under CVE-2023-49279 and does not represent a new issue. The underlying root cause, exploitation conditions, and impact are identical to the earlier CVE. The only difference is the example file type referenced (PDF instead of SVG), but the issue is not file-type specific and has already been addressed as a class of behavior.

Additionally, the PDF-based example is technically inaccurate in modern browser environments. JavaScript execution in PDFs is sandboxed and does not allow access to cookies or meaningful browser context, meaning it does not meet the criteria for XSS in practice. This has been confirmed both through Chromium's security documentation and internal testing.

Because:

  • The issue is a duplicate of CVE-2023-49279 (GHSA-6xmx-85x3-4cv2),
  • No new attack surface or product behavior is introduced,
  • The PDF example does not constitute a valid XSS vector
  • CVE.org has already updated the CVE with the dispute (https://www.cve.org/CVERecord?id=CVE-2025-67288)
  • It's stated in the official Umbraco CMS documentation that server-side file validation is the implementors own responsibility, since the CMS doesn't ship with a built-in mechanism.

I believe this advisory should be removed, or atleast merged with the existing CVE/advisory to avoid confusion and unnecessary concern for our users. Thank you!

Kind regards,
Anders
Umbraco Security Team

Copilot AI review requested due to automatic review settings January 9, 2026 09:36
@github-actions github-actions bot changed the base branch from main to legacy-git/advisory-improvement-6633 January 9, 2026 09:37
Copy link

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

This pull request updates the security advisory GHSA-54mj-vcvj-q3v5 for Umbraco CMS by downgrading the severity assessment. According to the PR description, the Umbraco security team has determined this CVE is a duplicate of an existing CVE-2023-49279 and the PDF-based attack vector is not valid in modern browsers.

Key changes:

  • Removes CVSS v3 scoring entirely
  • Downgrades CVSS v4 score to reflect no actual impact (all metrics set to None)
  • Changes severity rating from "MODERATE" to "LOW"

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

{
"type": "CVSS_V4",
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H/E:P"
"score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N"
Copy link

Copilot AI Jan 9, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The CVSS v4 score has been downgraded to all "N" (None) values for impact metrics (VC, VI, VA, SC, SI, SA), which results in a score of 0.0. A CVSS score of 0.0 typically indicates no vulnerability exists. However, the advisory still describes an "arbitrary file upload vulnerability" that "allows attackers to execute arbitrary code." This is inconsistent - if the vulnerability allows arbitrary code execution as stated, the impact metrics should reflect this. If the vulnerability has been determined to be invalid or a duplicate (as mentioned in the PR description), the advisory should likely be withdrawn rather than kept with a contradictory zero-impact score.

Suggested change
"score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N"
"score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"

Copilot uses AI. Check for mistakes.
"CWE-79"
],
"severity": "MODERATE",
"severity": "LOW",
Copy link

Copilot AI Jan 9, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The severity has been downgraded from "MODERATE" to "LOW", but this conflicts with the CVSS v4 score which now calculates to 0.0 (all impact metrics set to None). A CVSS score of 0.0 would typically correspond to "NONE" severity, not "LOW". Either the CVSS metrics should be adjusted to reflect a low-severity issue, or the severity should be changed to "NONE" or the advisory should be withdrawn if it's been determined to be invalid or duplicate.

Suggested change
"severity": "LOW",
"severity": "NONE",

Copilot uses AI. Check for mistakes.
@JonathanLEvans
Copy link

Hi @legacy-git,

I want to make sure I have this correct. Umbraco fixed CVE-2023-49279 by implementing the serverside-file-validation feature and documenting that administrators can block various file types. Umbraco leave the filter configuration to the administrator and does not block anything by default. This is why the researcher who found CVE-2025-67288 was able to upload a malicious PDF in a later, fixed version of Umbraco. Am I understanding correctly?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants