CVE-2025-24372 – ckan
Package
Manager: pip
Name: ckan
Vulnerable Version: >=0 <2.10.7 || >=2.11.0 <2.11.2
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00048 pctl0.14339
Details
CKAN has an XSS vector in user uploaded images in group/org and user profiles ### Impact Using a specially crafted file, a user could potentially upload a file containing code that when executed could send arbitrary requests to the server. If that file was opened by an administrator, it could lead to escalation of privileges of the original submitter or other malicious actions. Users must have been registered to the site to exploit this vulnerability. ### Patches This vulnerability has been fixed in CKAN 2.10.7 and 2.11.2 ### Workarounds On versions prior to CKAN 2.10.7 and 2.11.2, site maintainers can restrict the file types supported for uploading using the [ckan.upload.user.mimetypes](https://docs.ckan.org/en/latest/maintaining/configuration.html#ckan-upload-user-mimetypes) / [ckan.upload.user.types](https://docs.ckan.org/en/latest/maintaining/configuration.html#ckan-upload-user-types) and [ckan.upload.group.mimetypes](https://docs.ckan.org/en/latest/maintaining/configuration.html#ckan-upload-group-mimetypes) / [ckan.upload.group.types](https://docs.ckan.org/en/latest/maintaining/configuration.html#ckan-upload-group-types) config options. To entirely disable file uploads you can use: ```ini ckan.upload.user.types = none ```
Metadata
Created: 2025-02-05T17:41:33Z
Modified: 2025-02-05T21:45:13Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/02/GHSA-7pq5-qcp6-mcww/GHSA-7pq5-qcp6-mcww.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-7pq5-qcp6-mcww
Finding: F425
Auto approve: 1