Skip to main content

CVE-2025-3801: Cross Site Scripting in songquanpeng one-api

Medium
Published: Sat Apr 19 2025 (04/19/2025, 14:00:11 UTC)
Source: CVE
Vendor/Project: songquanpeng
Product: one-api

Description

A vulnerability was found in songquanpeng one-api up to 0.6.10. It has been classified as problematic. This affects an unknown part of the component System Setting Handler. The manipulation of the argument Homepage Content/About System/Footer leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 06/20/2025, 13:04:58 UTC

Technical Analysis

CVE-2025-3801 is a cross-site scripting (XSS) vulnerability identified in the songquanpeng one-api product, specifically affecting versions 0.6.0 through 0.6.10. The vulnerability resides in the System Setting Handler component, where manipulation of the 'Homepage Content/About System/Footer' argument allows an attacker to inject malicious scripts. This flaw enables remote exploitation without requiring authentication or user interaction, as the vulnerable parameter can be manipulated directly via crafted requests. The vulnerability is classified as problematic and has been publicly disclosed, although no known exploits have been observed in the wild yet. The nature of the vulnerability suggests that an attacker could execute arbitrary JavaScript in the context of users accessing the affected API or associated web interfaces, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of legitimate users. The lack of a patch or mitigation link indicates that remediation may not yet be available or publicly documented, increasing the urgency for affected organizations to implement compensating controls.

Potential Impact

For European organizations utilizing the songquanpeng one-api product, this XSS vulnerability poses a moderate risk primarily to the confidentiality and integrity of user sessions and data. Exploitation could allow attackers to steal authentication tokens, manipulate user interactions, or inject malicious content into web pages served by the API, undermining trust and potentially leading to further compromise. Organizations in sectors with high reliance on web-based APIs—such as finance, healthcare, and public services—may face increased risk due to the sensitive nature of data handled. Additionally, the vulnerability's remote exploitability without authentication broadens the attack surface, making it easier for threat actors to target multiple organizations. While availability impact is limited, the reputational damage and potential regulatory consequences under GDPR for data breaches caused by such attacks could be significant. The absence of known exploits in the wild currently reduces immediate threat levels but does not preclude future exploitation, especially given the public disclosure.

Mitigation Recommendations

Given the absence of an official patch, European organizations should prioritize the following specific mitigation measures: 1) Implement strict input validation and output encoding on all user-controllable fields, especially those related to homepage content or system settings, to neutralize malicious scripts. 2) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts within affected web contexts. 3) Conduct thorough code reviews and penetration testing focused on the System Setting Handler component to identify and remediate injection points. 4) Monitor web application logs for unusual or suspicious requests targeting the vulnerable parameters. 5) Isolate or restrict access to the one-api management interfaces to trusted networks or via VPN to reduce exposure. 6) Engage with the vendor or community for updates or patches and plan for timely deployment once available. 7) Educate developers and administrators about secure coding practices related to XSS prevention to avoid similar vulnerabilities in future versions.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-04-18T14:16:33.651Z
Cisa Enriched
true

Threat ID: 682d984bc4522896dcbf800d

Added to database: 5/21/2025, 9:09:31 AM

Last enriched: 6/20/2025, 1:04:58 PM

Last updated: 8/9/2025, 6:54:27 AM

Views: 24

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats