camaleon_cms 2.8.1

4 security vulnerabilities found in version 2.8.1

Camaleon CMS Vulnerable to Privilege Escalation through a Mass Assignment

critical severity CVE-2025-2304
critical severity CVE-2025-2304
Patched versions: >= 2.9.1

A Privilege Escalation through a Mass Assignment exists in Camaleon CMS

When a user wishes to change his password, the 'updated_ajax' method of the UsersController is called. The vulnerability stems from the use of the dangerous permit! method, which allows all parameters to pass through without any filtering.

Camaleon CMS vulnerable to stored XSS through user file upload (GHSL-2024-184)

medium severity GHSA-75j2-9gmc-m855
medium severity GHSA-75j2-9gmc-m855
Patched versions: >= 2.8.2
Unaffected versions: < 2.8.0

A stored cross-site scripting has been found in the image upload functionality that can be used by normal registered users: It is possible to upload a SVG image containing JavaScript and it's also possible to upload a HTML document when the format parameter is manually changed to documents or a string of an unsupported format. If an authenticated user or administrator visits that uploaded image or document malicious JavaScript can be executed on their behalf (e.g. changing or deleting content inside of the CMS.)

Impact

This issue may lead to account takeover due to reflected Cross-site scripting (XSS).

Remediation

Only allow the upload of safe files such as PNG, TXT and others or serve all "unsafe" files such as SVG and other files with a content-disposition: attachment header, which should prevent browsers from displaying them.

Additionally, a Content security policy (CSP) can be created that disallows inlined script. (Other parts of the application might need modification to continue functioning.)

To prevent the theft of the auth_token it could be marked with HttpOnly. This would however not prevent that actions could be performed as the authenticated user/administrator. Furthermore, it could make sense to use the authentication provided by Ruby on Rails, so that stolen tokens cannot be used anymore after some time.

camaleon_cms affected by cross site scripting

medium severity CVE-2024-48652
medium severity CVE-2024-48652

Cross Site Scripting vulnerability in camaleon-cms v.2.7.5 allows remote attacker to execute arbitrary code via the content group name field.

Camaleon CMS vulnerable to Stored Cross-site Scripting

medium severity CVE-2018-18260
medium severity CVE-2018-18260
Unaffected versions: < 2.4

In the 2.4 version of Camaleon CMS, Stored XSS has been discovered. The profile image in the User settings section can be run in the update / upload area via /admin/media/upload?actions=false.

No officially reported memory leakage issues detected.


This gem version does not have any officially reported memory leaked issues.

No license issues detected.


This gem version has a license in the gemspec.

This gem version is available.


This gem version has not been yanked and is still available for usage.