Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14896: Files or Directories Accessible to External Parties in yuzutech kroki

0
High
VulnerabilityCVE-2025-14896cvecve-2025-14896
Published: Thu Dec 18 2025 (12/18/2025, 16:20:15 UTC)
Source: CVE Database V5
Vendor/Project: yuzutech
Product: kroki

Description

CVE-2025-14896 is a high-severity vulnerability in yuzutech's kroki product caused by insufficient sanitization in the Vega convert() function when safeMode is enabled and the spec variable is an array. An attacker can craft a malicious Vega diagram specification to send arbitrary requests to any URL, including local file system paths, potentially exposing sensitive information. This vulnerability requires no authentication or user interaction and can be exploited remotely over the network. The CVSS 4. 0 score is 8. 7, reflecting its critical impact on confidentiality. No known exploits are currently reported in the wild. European organizations using kroki, especially those integrating Vega diagrams in automated workflows, are at risk of data leakage and information disclosure. Mitigation involves applying patches once available, restricting network access to kroki services, and sanitizing or validating diagram specifications before processing. Countries with significant software development sectors and usage of kroki or Vega, such as Germany, France, and the UK, are most likely affected.

AI-Powered Analysis

AILast updated: 12/18/2025, 17:11:33 UTC

Technical Analysis

CVE-2025-14896 is a vulnerability identified in the kroki product by yuzutech, specifically within the Vega diagram rendering component's convert() function. The flaw arises due to insufficient sanitization when the safeMode parameter is enabled and the input spec is an array. This improper input validation allows an attacker to craft a malicious Vega diagram specification that can cause the system to send HTTP requests to arbitrary URLs, including local file system paths. Consequently, this can lead to unauthorized access and exposure of sensitive files or directories on the host running kroki. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its risk profile. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and a high impact on confidentiality (VC:H) with no impact on integrity or availability. Although no known exploits are reported in the wild, the potential for data leakage is significant, especially in environments where kroki is exposed to untrusted users or integrated into automated pipelines processing untrusted diagram specifications. The affected version is listed as '0', which likely refers to initial or early releases of kroki. The vulnerability underscores the importance of robust input validation and sanitization in diagram rendering engines that process complex specifications.

Potential Impact

For European organizations, this vulnerability poses a significant risk of sensitive information disclosure. Organizations using kroki to generate or render Vega diagrams, particularly in automated or web-facing environments, may inadvertently expose internal files or data to external attackers. This could lead to leakage of intellectual property, configuration files, or other confidential information. The lack of required authentication and user interaction means attackers can exploit the vulnerability remotely and stealthily. The impact is primarily on confidentiality, with no direct effect on system integrity or availability. However, the exposure of sensitive data can facilitate further attacks, including social engineering, privilege escalation, or lateral movement within networks. Sectors such as software development, research institutions, and enterprises relying on diagrammatic data visualization tools are especially vulnerable. Given the high CVSS score, organizations must treat this vulnerability as a critical security issue.

Mitigation Recommendations

1. Apply official patches or updates from yuzutech as soon as they become available to address the sanitization flaw in the convert() function. 2. Until patches are released, restrict network access to kroki services by implementing firewall rules or network segmentation to limit exposure to trusted users only. 3. Implement input validation and sanitization on all Vega diagram specifications before they are processed by kroki, rejecting or sanitizing any array inputs or suspicious constructs. 4. Monitor logs for unusual or unexpected requests involving diagram specifications that could indicate exploitation attempts. 5. Consider deploying web application firewalls (WAFs) with custom rules to detect and block malicious diagram payloads targeting this vulnerability. 6. Educate developers and system administrators about the risks of processing untrusted diagram inputs and encourage secure coding practices. 7. If feasible, run kroki services in isolated or containerized environments with minimal privileges to limit the impact of potential exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
snyk
Date Reserved
2025-12-18T16:19:38.828Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6944323d4eb3efac369b37ac

Added to database: 12/18/2025, 4:56:29 PM

Last enriched: 12/18/2025, 5:11:33 PM

Last updated: 12/19/2025, 3:17:18 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats