{"id":"CVE-2020-4041","details":"In Bolt CMS before version 3.7.1, the filename of uploaded files was vulnerable to stored XSS. It is not possible to inject javascript code in the file name when creating/uploading the file. But, once created/uploaded, it can be renamed to inject the payload in it. Additionally, the measures to prevent renaming the file to disallowed filename extensions could be circumvented. This is fixed in Bolt 3.7.1.","aliases":["GHSA-68q3-7wjp-7q3j"],"modified":"2026-03-20T11:37:28.898139Z","published":"2020-06-08T22:15:10.697Z","related":["GHSA-68q3-7wjp-7q3j"],"references":[{"type":"FIX","url":"https://github.com/bolt/bolt/commit/b42cbfcf3e3108c46a80581216ba03ef449e419f"},{"type":"FIX","url":"https://github.com/bolt/bolt/pull/7853"},{"type":"FIX","url":"https://github.com/bolt/bolt/security/advisories/GHSA-68q3-7wjp-7q3j"},{"type":"EVIDENCE","url":"http://packetstormsecurity.com/files/158299/Bolt-CMS-3.7.0-XSS-CSRF-Shell-Upload.html"},{"type":"EVIDENCE","url":"http://seclists.org/fulldisclosure/2020/Jul/4"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/bolt/bolt","events":[{"introduced":"0"},{"fixed":"e46638dc59da2c3f899e9132d455cbcda9260e89"},{"fixed":"b42cbfcf3e3108c46a80581216ba03ef449e419f"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"3.7.1"}]}}],"versions":["3.5.7","ext-edit","ext-edit-v0.51","v0.8.4","v0.8.5","v0.9.10","v0.9.5","v1.0.0","v1.1.2","v1.1.4","v1.2.1","v1.3.0","v1.4.0","v1.4.3","v1.5.1","v1.5.6","v1.6.0","v1.6.2","v1.6.3","v1.6.3.1","v2.0.0","v2.0.1","v2.0.2","v2.0.3","v2.0.4","v2.0.5","v2.1.0","v3.0.0","v3.0.1","v3.0.10","v3.0.11","v3.0.12","v3.0.2","v3.0.3","v3.0.4","v3.0.5","v3.0.6","v3.0.7","v3.0.8","v3.0.9","v3.1.0","v3.1.1","v3.1.2","v3.1.3","v3.1.4","v3.1.5","v3.1.6","v3.2.0","v3.2.1","v3.2.10","v3.2.11","v3.2.12","v3.2.13","v3.2.14","v3.2.15","v3.2.16","v3.2.17","v3.2.18","v3.2.19","v3.2.2","v3.2.20","v3.2.3","v3.2.4","v3.2.5","v3.2.6","v3.2.7","v3.2.8","v3.2.9","v3.3.0","v3.3.1","v3.3.2","v3.3.3","v3.3.4","v3.3.5","v3.3.6","v3.4.0","v3.4.1","v3.4.10","v3.4.11","v3.4.2","v3.4.3","v3.4.4","v3.4.5","v3.4.6","v3.4.7","v3.4.8","v3.4.9","v3.5.0","v3.5.1","v3.5.2","v3.5.3","v3.5.4","v3.5.5","v3.5.6","v3.6.0","v3.6.0-beta.1","v3.6.0-beta.2","v3.6.0-beta.3","v3.6.0-beta.4","v3.6.0-beta.5","v3.6.0-beta.6","v3.6.0-beta.7","v3.6.1","v3.6.10","v3.6.11","v3.6.2","v3.6.3","v3.6.4","v3.6.5","v3.6.6","v3.6.7","v3.6.8","v3.6.9","v3.7.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-4041.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}