@@ -205,11 +205,13 @@ htmlcleaner:
205205
206206# Define the file types (extensions to be exact) that are acceptable for upload
207207# in either file fields or through the files screen.
208- accept_file_types : [ yaml, twig, html, js, css, scss, gif, jpg, jpeg, png, ico, zip, tgz, txt, md, doc, docx, pdf, epub, xls, xlsx, ppt, pptx, mp3, ogg, wav, m4a, mp4, m4v, ogv, wmv, avi, webm, svg, webp, avif]
208+ # It only includes file types / extensions that are harder to exploit.
209+ accept_file_types : [ gif, jpg, jpeg, png, txt, md, pdf, epub, mp3 ]
209210
210- # Alternatively, if you wish to limit these, uncomment the following list
211- # instead. It just includes file types / extensions that are harder to exploit.
212- # accept_file_types: [ gif, jpg, jpeg, png, txt, md, pdf, epub, mp3 ]
211+ # Alternatively, if you wish to not limit these, uncomment the following list
212+ # instead. Note that this can open your installation to XSS or other vulnerabilities as files
213+ # are uploaded as is to a by default publicly accessible folder on the webserver.
214+ # accept_file_types: [ yaml, twig, html, js, css, scss, gif, jpg, jpeg, png, ico, zip, tgz, txt, md, doc, docx, pdf, epub, xls, xlsx, ppt, pptx, mp3, ogg, wav, m4a, mp4, m4v, ogv, wmv, avi, webm, svg, webp, avif]
213215
214216accept_media_types : [ gif, jpg, jpeg, png, svg, pdf, mp3, tiff, avif, webp ]
215217
0 commit comments