jirafeau CVE Vulnerabilities & Metrics

Focus on jirafeau vulnerabilities and metrics.

Last updated: 21 Aug 2025, 22:25 UTC

About jirafeau Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with jirafeau. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total jirafeau CVEs: 9
Earliest CVE date: 06 Jul 2018, 17:29 UTC
Latest CVE date: 04 Jul 2025, 12:15 UTC

Latest CVE reference: CVE-2025-7066

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 2

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): -100.0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): -100.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical jirafeau CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 3.76

Max CVSS: 6.8

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 2
4.0-6.9 7
7.0-8.9 0
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS jirafeau CVEs

These are the five CVEs with the highest CVSS scores for jirafeau, sorted by severity first and recency.

All CVEs for jirafeau

CVE-2025-7066 jirafeau vulnerability CVSS: 0 04 Jul 2025, 12:15 UTC

Jirafeau normally prevents browser preview for text files due to the possibility that for example SVG and HTML documents could be exploited for cross site scripting. This was done by storing the MIME type of a file and allowing only browser preview for MIME types beginning with image (except for image/svg+xml, see CVE-2022-30110 and CVE-2024-12326), video and audio. However, it was possible to bypass this check by sending a manipulated MIME type containing a comma and an other MIME type like text/html (for example image/png,text/html). Browsers see multiple MIME types and text/html would takes precedence, allowing a possible attacker to do a cross-site scripting attack. The check for MIME types was enhanced to prevent a browser preview when the stored MIME type contains a comma.

CVE-2024-12326 jirafeau vulnerability CVSS: 0 06 Dec 2024, 21:15 UTC

Jirafeau normally prevents browser preview for SVG files due to the possibility that manipulated SVG files could be exploited for cross site scripting. This was done by storing the MIME type of a file and preventing the browser preview for MIME type image/svg+xml. This issue was first reported in CVE-2022-30110. However, it was still possible to do a browser preview of a SVG file by sending a manipulated MIME type during the upload, where the case of any letter in image/svg+xml had been changed (like image/svg+XML). The check for image/svg+xml has been changed to be case insensitive.

CVE-2022-30110 jirafeau vulnerability CVSS: 4.3 17 May 2022, 14:15 UTC

The file preview functionality in Jirafeau < 4.4.0, which is enabled by default, could be exploited for cross site scripting. An attacker could upload image/svg+xml files containing JavaScript. When someone visits the File Preview URL for this file, the JavaScript inside of this image/svg+xml file will be executed in the users' browser.

CVE-2018-11351 jirafeau vulnerability CVSS: 4.3 07 Jul 2018, 17:29 UTC

script.php in Jirafeau before 3.4.1 is affected by two stored Cross-Site Scripting (XSS) vulnerabilities. These are stored within the shared files description file and allow the execution of a JavaScript payload each time an administrator searches or lists uploaded files. These two injections could be triggered without authentication, and target the administrator. The attack vectors are the Content-Type field and the filename parameter.

CVE-2018-11350 jirafeau vulnerability CVSS: 4.3 07 Jul 2018, 17:29 UTC

An issue was discovered in Jirafeau before 3.4.1. The file "search by name" form is affected by one Cross-Site Scripting vulnerability via the name parameter.

CVE-2018-11349 jirafeau vulnerability CVSS: 6.8 07 Jul 2018, 17:29 UTC

The administration panel of Jirafeau before 3.4.1 is vulnerable to three CSRF attacks on search functionalities: search_by_name, search_by_hash, and search_link.

CVE-2018-13409 jirafeau vulnerability CVSS: 4.3 06 Jul 2018, 17:29 UTC

An issue was discovered in Jirafeau before 3.4.1. The "search file by hash" form is affected by reflected XSS that could allow, by targeting an administrator, stealing a session and gaining administrative privileges.

CVE-2018-13408 jirafeau vulnerability CVSS: 4.3 06 Jul 2018, 17:29 UTC

An issue was discovered in Jirafeau before 3.4.1. The "search file by link" form is affected by reflected XSS that could allow, by targeting an administrator, stealing a session and gaining administrative privileges.

CVE-2018-13407 jirafeau vulnerability CVSS: 5.5 06 Jul 2018, 17:29 UTC

A CSRF issue was discovered in Jirafeau before 3.4.1. The "delete file" feature on the admin panel is not protected against automated requests and could be abused.