The file preview functionality in Jirafeau < 4.4.0, which is enabled by default, could be exploited for cross site scripting. An attacker could upload image/svg+xml files containing JavaScript. When someone visits the File Preview URL for this file, the JavaScript inside of this image/svg+xml file will be executed in the users' browser.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/30xxx/CVE-2022-30110.json",
"cna_assigner": "mitre"
}