2FAuth is a web app to manage Two-Factor Authentication (2FA) accounts and generate their security codes. Versions prior to 5.4.1 are vulnerable to stored cross-site scripting due to improper headers in direct access to uploaded SVGs. The application allows uploading images in several places. One of the accepted types of image is SVG, which allows JS scripting. Therefore, by uploading a malicious SVG which contains JS code, an attacker which is able to drive a victim to the uploaded image could compromise that victim's session and access to their tokens. Version 5.4.1 contains a patch for the issue.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-46025 2FAuth is a web app to manage Two-Factor Authentication (2FA) accounts and generate their security codes. Versions prior to 5.4.1 are vulnerable to stored cross-site scripting due to improper headers in direct access to uploaded SVGs. The application allows uploading images in several places. One of the accepted types of image is SVG, which allows JS scripting. Therefore, by uploading a malicious SVG which contains JS code, an attacker which is able to drive a victim to the uploaded image could compromise that victim's session and access to their tokens. Version 5.4.1 contains a patch for the issue.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 05 Aug 2025 02:00:00 +0900

Type Values Removed Values Added
First Time appeared 2fauth
2fauth 2fauth
CPEs cpe:2.3:a:2fauth:2fauth:*:*:*:*:*:*:*:*
Vendors & Products 2fauth
2fauth 2fauth

Thu, 21 Nov 2024 00:15:00 +0900

Type Values Removed Values Added
First Time appeared Bubka
Bubka 2fauth
CPEs cpe:2.3:a:bubka:2fauth:*:*:*:*:*:*:*:*
Vendors & Products Bubka
Bubka 2fauth
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 20 Nov 2024 23:15:00 +0900

Type Values Removed Values Added
Description 2FAuth is a web app to manage Two-Factor Authentication (2FA) accounts and generate their security codes. Versions prior to 5.4.1 are vulnerable to stored cross-site scripting due to improper headers in direct access to uploaded SVGs. The application allows uploading images in several places. One of the accepted types of image is SVG, which allows JS scripting. Therefore, by uploading a malicious SVG which contains JS code, an attacker which is able to drive a victim to the uploaded image could compromise that victim's session and access to their tokens. Version 5.4.1 contains a patch for the issue.
Title 2FAuth vulnerable to stored cross-site scripting via SVG upload and direct access render
Weaknesses CWE-79
CWE-80
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-11-20T14:31:57.628Z

Reserved: 2024-11-14T15:05:46.770Z

Link: CVE-2024-52597

cve-icon Vulnrichment

Updated: 2024-11-20T14:31:48.441Z

cve-icon NVD

Status : Analyzed

Published: 2024-11-20T14:15:17.967

Modified: 2025-08-04T16:57:38.327

Link: CVE-2024-52597

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses