{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T00:49:56.889","vulnerabilities":[{"cve":{"id":"CVE-2024-12326","sourceIdentifier":"cve@gitlab.com","published":"2024-12-06T21:15:05.957","lastModified":"2025-08-05T17:49:09.887","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Jirafeau normally prevents browser preview for SVG files due to the possibility that manipulated SVG files could be exploited for cross site scripting. This was done by storing the MIME type of a file and preventing the browser preview for MIME type image/svg+xml. This issue was first reported in CVE-2022-30110. However, it was still possible to do a browser preview of a SVG file by sending a manipulated MIME type during the upload, where the case of any letter in image/svg+xml had been changed (like image/svg+XML). The check for image/svg+xml has been changed to be case insensitive."},{"lang":"es","value":"Jirafeau normalmente impide la vista previa del navegador para archivos SVG debido a la posibilidad de que los archivos SVG manipulados puedan ser explotados para cross site scripting. Esto se hacía almacenando el tipo MIME de un archivo y evitando la vista previa del navegador para el tipo MIME image/svg+xml. Este problema se informó por primera vez en CVE-2022-30110. Sin embargo, todavía era posible hacer una vista previa del navegador de un archivo SVG enviando un tipo MIME manipulado durante la carga, donde se había cambiado el caso de cualquier letra en image/svg+xml (como image/svg+XML). La verificación de image/svg+xml se ha modificado para que no distinga entre mayúsculas y minúsculas."}],"metrics":{"cvssMetricV31":[{"source":"cve@gitlab.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}]},"weaknesses":[{"source":"cve@gitlab.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:jirafeau:jirafeau:*:*:*:*:*:*:*:*","versionEndExcluding":"4.6.1","matchCriteriaId":"6B3F43BB-4023-42CD-AD28-F7EB3A2A351A"}]}]}],"references":[{"url":"https://gitlab.com/jirafeau/Jirafeau/-/commit/6cfca8753d54e2025c6020b2af32529e25f58c66","source":"cve@gitlab.com","tags":["Patch"]},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-30110","source":"cve@gitlab.com","tags":["Not Applicable"]}]}}]}