Project Subscriptions
No advisories yet.
Solution
Sesame has implemented corrective measures at both the backend and frontend levels. In addition, previously uploaded files have been reviewed. Currently, the system completely blocks the upload of SVG files, and existing content has been cleaned up, rendering the vulnerability fixed.
Workaround
No workaround given by the vendor.
Thu, 29 Jan 2026 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sesame Labs S.l
Sesame Labs S.l sesame |
|
| CPEs | cpe:2.3:a:sesame_labs_s.l:sesame:all_versions:*:*:*:*:*:*:* | |
| Vendors & Products |
Sesame Labs S.l
Sesame Labs S.l sesame |
Wed, 21 Jan 2026 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sesame Labs
Sesame Labs sesame |
|
| Vendors & Products |
Sesame Labs
Sesame Labs sesame |
Tue, 20 Jan 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 20 Jan 2026 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Stored Cross-Site Scripting (XSS) vulnerability in Sesame web application, due to the fact that uploaded SVG images are not properly sanitized. This allows attackers to embed malicious scripts in SVG files by sending a POST request using the 'logo' parameter in '/api/v3/companies/<ID>/logo', which are then stored on the server and executed in the context of any user who accesses the compromised resource. | |
| Title | Stored Cross-Site Scripting (XSS) in Sesame web application | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2026-01-29T11:33:18.995Z
Reserved: 2025-04-16T09:09:35.597Z
Link: CVE-2025-41084
Updated: 2026-01-20T14:42:40.542Z
Status : Awaiting Analysis
Published: 2026-01-20T10:16:05.773
Modified: 2026-01-26T15:05:23.427
Link: CVE-2025-41084
No data.
OpenCVE Enrichment
Updated: 2026-01-21T11:19:41Z