Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. kiwitcms
  4. ›
  5. CVE-2023-30613

CVE-2023-30613: Unrestricted file upload in kiwi TCMS

April 24, 2023 (updated April 11, 2025)

Kiwi TCMS allows users to upload attachments to test plans, test cases, etc. In earlier versions there is no control over what kinds of files can be uploaded. Thus a malicious actor may upload an .exe file or a file containing embedded JavaScript and trick others into clicking on these files causing vulnerable browsers to execute malicious code on another computer or attempting XSS attacks.

Stored XSS attacks via file uploads have been fixed in earlier versions of Kiwi TCMS, see GHSA-2wcr-87wf-cf9j. This advisory deals with prohibiting users to upload potentially compromised files in the first place.

References

  • github.com/advisories/GHSA-fwcf-753v-fgcj
  • github.com/kiwitcms/Kiwi
  • github.com/kiwitcms/Kiwi/security/advisories/GHSA-fwcf-753v-fgcj
  • huntr.com/bounties/c30d3503-600d-4d00-9571-98826a51f12c
  • huntr.dev/bounties/c30d3503-600d-4d00-9571-98826a51f12c
  • kiwitcms.org/blog/kiwi-tcms-team/2023/04/23/kiwi-tcms-122
  • nvd.nist.gov/vuln/detail/CVE-2023-30613

Code Behaviors & Features

Detect and mitigate CVE-2023-30613 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 12.2

Fixed versions

  • 12.2

Solution

Upgrade to version 12.2 or above.

Impact 8.1 HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-434: Unrestricted Upload of File with Dangerous Type

Source file

pypi/kiwitcms/CVE-2023-30613.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:50 +0000.