CVE-2025-14896: Files or Directories Accessible to External Parties in yuzutech kroki
due to insufficient sanitazation in Vega’s `convert()` function when `safeMode` is enabled and the spec variable is an array. An attacker can craft a malicious Vega diagram specification that will allow them to send requests to any URL, including local file system paths, leading to exposure of sensitive information.
AI Analysis
Technical Summary
CVE-2025-14896 is a vulnerability identified in the kroki product by yuzutech, specifically within the Vega diagram rendering component's convert() function. The flaw arises due to insufficient sanitization when the safeMode parameter is enabled and the input spec is an array. This improper input validation allows an attacker to craft a malicious Vega diagram specification that can cause the system to send HTTP requests to arbitrary URLs, including local file system paths. Consequently, this can lead to unauthorized access and exposure of sensitive files or directories on the host running kroki. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its risk profile. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and a high impact on confidentiality (VC:H) with no impact on integrity or availability. Although no known exploits are reported in the wild, the potential for data leakage is significant, especially in environments where kroki is exposed to untrusted users or integrated into automated pipelines processing untrusted diagram specifications. The affected version is listed as '0', which likely refers to initial or early releases of kroki. The vulnerability underscores the importance of robust input validation and sanitization in diagram rendering engines that process complex specifications.
Potential Impact
For European organizations, this vulnerability poses a significant risk of sensitive information disclosure. Organizations using kroki to generate or render Vega diagrams, particularly in automated or web-facing environments, may inadvertently expose internal files or data to external attackers. This could lead to leakage of intellectual property, configuration files, or other confidential information. The lack of required authentication and user interaction means attackers can exploit the vulnerability remotely and stealthily. The impact is primarily on confidentiality, with no direct effect on system integrity or availability. However, the exposure of sensitive data can facilitate further attacks, including social engineering, privilege escalation, or lateral movement within networks. Sectors such as software development, research institutions, and enterprises relying on diagrammatic data visualization tools are especially vulnerable. Given the high CVSS score, organizations must treat this vulnerability as a critical security issue.
Mitigation Recommendations
1. Apply official patches or updates from yuzutech as soon as they become available to address the sanitization flaw in the convert() function. 2. Until patches are released, restrict network access to kroki services by implementing firewall rules or network segmentation to limit exposure to trusted users only. 3. Implement input validation and sanitization on all Vega diagram specifications before they are processed by kroki, rejecting or sanitizing any array inputs or suspicious constructs. 4. Monitor logs for unusual or unexpected requests involving diagram specifications that could indicate exploitation attempts. 5. Consider deploying web application firewalls (WAFs) with custom rules to detect and block malicious diagram payloads targeting this vulnerability. 6. Educate developers and system administrators about the risks of processing untrusted diagram inputs and encourage secure coding practices. 7. If feasible, run kroki services in isolated or containerized environments with minimal privileges to limit the impact of potential exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden
CVE-2025-14896: Files or Directories Accessible to External Parties in yuzutech kroki
Description
due to insufficient sanitazation in Vega’s `convert()` function when `safeMode` is enabled and the spec variable is an array. An attacker can craft a malicious Vega diagram specification that will allow them to send requests to any URL, including local file system paths, leading to exposure of sensitive information.
AI-Powered Analysis
Technical Analysis
CVE-2025-14896 is a vulnerability identified in the kroki product by yuzutech, specifically within the Vega diagram rendering component's convert() function. The flaw arises due to insufficient sanitization when the safeMode parameter is enabled and the input spec is an array. This improper input validation allows an attacker to craft a malicious Vega diagram specification that can cause the system to send HTTP requests to arbitrary URLs, including local file system paths. Consequently, this can lead to unauthorized access and exposure of sensitive files or directories on the host running kroki. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its risk profile. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and a high impact on confidentiality (VC:H) with no impact on integrity or availability. Although no known exploits are reported in the wild, the potential for data leakage is significant, especially in environments where kroki is exposed to untrusted users or integrated into automated pipelines processing untrusted diagram specifications. The affected version is listed as '0', which likely refers to initial or early releases of kroki. The vulnerability underscores the importance of robust input validation and sanitization in diagram rendering engines that process complex specifications.
Potential Impact
For European organizations, this vulnerability poses a significant risk of sensitive information disclosure. Organizations using kroki to generate or render Vega diagrams, particularly in automated or web-facing environments, may inadvertently expose internal files or data to external attackers. This could lead to leakage of intellectual property, configuration files, or other confidential information. The lack of required authentication and user interaction means attackers can exploit the vulnerability remotely and stealthily. The impact is primarily on confidentiality, with no direct effect on system integrity or availability. However, the exposure of sensitive data can facilitate further attacks, including social engineering, privilege escalation, or lateral movement within networks. Sectors such as software development, research institutions, and enterprises relying on diagrammatic data visualization tools are especially vulnerable. Given the high CVSS score, organizations must treat this vulnerability as a critical security issue.
Mitigation Recommendations
1. Apply official patches or updates from yuzutech as soon as they become available to address the sanitization flaw in the convert() function. 2. Until patches are released, restrict network access to kroki services by implementing firewall rules or network segmentation to limit exposure to trusted users only. 3. Implement input validation and sanitization on all Vega diagram specifications before they are processed by kroki, rejecting or sanitizing any array inputs or suspicious constructs. 4. Monitor logs for unusual or unexpected requests involving diagram specifications that could indicate exploitation attempts. 5. Consider deploying web application firewalls (WAFs) with custom rules to detect and block malicious diagram payloads targeting this vulnerability. 6. Educate developers and system administrators about the risks of processing untrusted diagram inputs and encourage secure coding practices. 7. If feasible, run kroki services in isolated or containerized environments with minimal privileges to limit the impact of potential exploitation.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- snyk
- Date Reserved
- 2025-12-18T16:19:38.828Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6944323d4eb3efac369b37ac
Added to database: 12/18/2025, 4:56:29 PM
Last enriched: 12/18/2025, 5:11:33 PM
Last updated: 2/6/2026, 5:36:54 AM
Views: 45
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1990: NULL Pointer Dereference in oatpp
MediumCVE-2026-1979: Use After Free in mruby
MediumCVE-2026-1978: Direct Request in kalyan02 NanoCMS
MediumCVE-2026-25698
LowCVE-2026-25697
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.