CVE-2025-3801: Cross Site Scripting in songquanpeng one-api
A vulnerability was found in songquanpeng one-api up to 0.6.10. It has been classified as problematic. This affects an unknown part of the component System Setting Handler. The manipulation of the argument Homepage Content/About System/Footer leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-3801 is a cross-site scripting (XSS) vulnerability identified in the songquanpeng one-api product, specifically affecting versions 0.6.0 through 0.6.10. The vulnerability resides in the System Setting Handler component, where manipulation of the 'Homepage Content/About System/Footer' argument allows an attacker to inject malicious scripts. This flaw enables remote exploitation without requiring authentication or user interaction, as the vulnerable parameter can be manipulated directly via crafted requests. The vulnerability is classified as problematic and has been publicly disclosed, although no known exploits have been observed in the wild yet. The nature of the vulnerability suggests that an attacker could execute arbitrary JavaScript in the context of users accessing the affected API or associated web interfaces, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of legitimate users. The lack of a patch or mitigation link indicates that remediation may not yet be available or publicly documented, increasing the urgency for affected organizations to implement compensating controls.
Potential Impact
For European organizations utilizing the songquanpeng one-api product, this XSS vulnerability poses a moderate risk primarily to the confidentiality and integrity of user sessions and data. Exploitation could allow attackers to steal authentication tokens, manipulate user interactions, or inject malicious content into web pages served by the API, undermining trust and potentially leading to further compromise. Organizations in sectors with high reliance on web-based APIs—such as finance, healthcare, and public services—may face increased risk due to the sensitive nature of data handled. Additionally, the vulnerability's remote exploitability without authentication broadens the attack surface, making it easier for threat actors to target multiple organizations. While availability impact is limited, the reputational damage and potential regulatory consequences under GDPR for data breaches caused by such attacks could be significant. The absence of known exploits in the wild currently reduces immediate threat levels but does not preclude future exploitation, especially given the public disclosure.
Mitigation Recommendations
Given the absence of an official patch, European organizations should prioritize the following specific mitigation measures: 1) Implement strict input validation and output encoding on all user-controllable fields, especially those related to homepage content or system settings, to neutralize malicious scripts. 2) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts within affected web contexts. 3) Conduct thorough code reviews and penetration testing focused on the System Setting Handler component to identify and remediate injection points. 4) Monitor web application logs for unusual or suspicious requests targeting the vulnerable parameters. 5) Isolate or restrict access to the one-api management interfaces to trusted networks or via VPN to reduce exposure. 6) Engage with the vendor or community for updates or patches and plan for timely deployment once available. 7) Educate developers and administrators about secure coding practices related to XSS prevention to avoid similar vulnerabilities in future versions.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2025-3801: Cross Site Scripting in songquanpeng one-api
Description
A vulnerability was found in songquanpeng one-api up to 0.6.10. It has been classified as problematic. This affects an unknown part of the component System Setting Handler. The manipulation of the argument Homepage Content/About System/Footer leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-3801 is a cross-site scripting (XSS) vulnerability identified in the songquanpeng one-api product, specifically affecting versions 0.6.0 through 0.6.10. The vulnerability resides in the System Setting Handler component, where manipulation of the 'Homepage Content/About System/Footer' argument allows an attacker to inject malicious scripts. This flaw enables remote exploitation without requiring authentication or user interaction, as the vulnerable parameter can be manipulated directly via crafted requests. The vulnerability is classified as problematic and has been publicly disclosed, although no known exploits have been observed in the wild yet. The nature of the vulnerability suggests that an attacker could execute arbitrary JavaScript in the context of users accessing the affected API or associated web interfaces, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of legitimate users. The lack of a patch or mitigation link indicates that remediation may not yet be available or publicly documented, increasing the urgency for affected organizations to implement compensating controls.
Potential Impact
For European organizations utilizing the songquanpeng one-api product, this XSS vulnerability poses a moderate risk primarily to the confidentiality and integrity of user sessions and data. Exploitation could allow attackers to steal authentication tokens, manipulate user interactions, or inject malicious content into web pages served by the API, undermining trust and potentially leading to further compromise. Organizations in sectors with high reliance on web-based APIs—such as finance, healthcare, and public services—may face increased risk due to the sensitive nature of data handled. Additionally, the vulnerability's remote exploitability without authentication broadens the attack surface, making it easier for threat actors to target multiple organizations. While availability impact is limited, the reputational damage and potential regulatory consequences under GDPR for data breaches caused by such attacks could be significant. The absence of known exploits in the wild currently reduces immediate threat levels but does not preclude future exploitation, especially given the public disclosure.
Mitigation Recommendations
Given the absence of an official patch, European organizations should prioritize the following specific mitigation measures: 1) Implement strict input validation and output encoding on all user-controllable fields, especially those related to homepage content or system settings, to neutralize malicious scripts. 2) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts within affected web contexts. 3) Conduct thorough code reviews and penetration testing focused on the System Setting Handler component to identify and remediate injection points. 4) Monitor web application logs for unusual or suspicious requests targeting the vulnerable parameters. 5) Isolate or restrict access to the one-api management interfaces to trusted networks or via VPN to reduce exposure. 6) Engage with the vendor or community for updates or patches and plan for timely deployment once available. 7) Educate developers and administrators about secure coding practices related to XSS prevention to avoid similar vulnerabilities in future versions.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-04-18T14:16:33.651Z
- Cisa Enriched
- true
Threat ID: 682d984bc4522896dcbf800d
Added to database: 5/21/2025, 9:09:31 AM
Last enriched: 6/20/2025, 1:04:58 PM
Last updated: 8/9/2025, 6:54:27 AM
Views: 24
Related Threats
CVE-2025-5048: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in Autodesk AutoCAD
HighCVE-2025-5047: CWE-457: Use of Uninitialized Variable in Autodesk AutoCAD
HighCVE-2025-5046: CWE-125 Out-of-Bounds Read in Autodesk AutoCAD
HighCVE-2025-54466: CWE-94 Improper Control of Generation of Code ('Code Injection') in Apache Software Foundation Apache OFBiz
CriticalCVE-2025-9053: SQL Injection in projectworlds Travel Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.