CVE-2025-7066

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-7066
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-7066.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-7066
Published
2025-07-04T12:15:35Z
Modified
2025-07-08T16:48:40.943065Z
Summary
[none]
Details

Jirafeau normally prevents browser preview for text files due to the possibility that for example SVG and HTML documents could be exploited for cross site scripting. This was done by storing the MIME type of a file and allowing only browser preview for MIME types beginning with image (except for image/svg+xml, see CVE-2022-30110 and CVE-2024-12326), video and audio. However, it was possible to bypass this check by sending a manipulated MIME type containing a comma and an other MIME type like text/html (for example image/png,text/html). Browsers see multiple MIME types and text/html would takes precedence, allowing a possible attacker to do a cross-site scripting attack. The check for MIME types was enhanced to prevent a browser preview when the stored MIME type contains a comma.

References

Affected packages

Git / gitlab.com/jirafeau/Jirafeau

Affected ranges

Type
GIT
Repo
https://gitlab.com/jirafeau/Jirafeau
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

1.*

1.0
1.1
1.2.0

2.*

2.0.0

3.*

3.0.0
3.1.0
3.2.0
3.2.1
3.3.0
3.4.0
3.4.1

4.*

4.0.0
4.1.0
4.1.1
4.2.0
4.3.0
4.4.0
4.5.0
4.6.0
4.6.1
4.6.2