{"id":"CVE-2025-63307","details":"alexusmai laravel-file-manager 3.3.1 is vulnerable to Cross Site Scripting (XSS). The application permits user-controlled upload, create, and rename of files to HTML and SVG types and serves those files inline without adequate content-type validation or output sanitization.","modified":"2026-03-13T03:40:45.770001Z","published":"2025-11-06T16:16:13.687Z","references":[{"type":"ADVISORY","url":"https://github.com/Theethat-Thamwasin/CVE-2025-63307"},{"type":"PACKAGE","url":"https://github.com/alexusmai/laravel-file-manager"},{"type":"EVIDENCE","url":"https://github.com/Theethat-Thamwasin/CVE-2025-63307/blob/main/POC-CVE-63307.md"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/alexusmai/laravel-file-manager","events":[{"introduced":"0"},{"last_affected":"83e634bbe8acbb2c16c8660c751acae4c222697e"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"3.3.1"}]}}],"versions":["1.0.0","1.0.1","1.0.2","1.0.3","1.0.4","2.1.0","2.1.1","2.1.2","2.1.4","3.2.0","3.2.1","3.3.0","3.3.1","v2.0.0","v2.0.1","v2.0.2","v2.0.3","v2.0.4","v2.0.5","v2.0.6","v2.1.3","v2.2.1","v2.2.2","v2.2.3","v2.3.0","v2.3.1","v2.3.2","v2.4.0","v2.4.1","v2.4.10","v2.4.11","v2.4.12","v2.4.13","v2.4.14","v2.4.2","v2.4.3","v2.4.4","v2.4.5","v2.4.6","v2.4.7","v2.4.8","v2.4.9","v2.5.0","v2.5.1","v2.5.2","v2.5.3","v2.5.4","v3.0.1","v3.0.2","v3.0.3","v3.0.4","v3.0.5","v3.1.0","v3.1.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-63307.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N"}]}