CVE-2025-3801: Cross Site Scripting in songquanpeng one-api
A vulnerability was found in songquanpeng one-api up to 0.6.10. It has been classified as problematic. This affects an unknown part of the component System Setting Handler. The manipulation of the argument Homepage Content/About System/Footer leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-3801 is a cross-site scripting (XSS) vulnerability identified in the songquanpeng one-api product, specifically affecting versions 0.6.0 through 0.6.10. The vulnerability resides in the System Setting Handler component, where manipulation of the 'Homepage Content/About System/Footer' argument allows an attacker to inject malicious scripts. This flaw enables remote exploitation without requiring authentication or user interaction, as the vulnerable parameter can be manipulated directly via crafted requests. The vulnerability is classified as problematic and has been publicly disclosed, although no known exploits have been observed in the wild yet. The nature of the vulnerability suggests that an attacker could execute arbitrary JavaScript in the context of users accessing the affected API or associated web interfaces, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of legitimate users. The lack of a patch or mitigation link indicates that remediation may not yet be available or publicly documented, increasing the urgency for affected organizations to implement compensating controls.
Potential Impact
For European organizations utilizing the songquanpeng one-api product, this XSS vulnerability poses a moderate risk primarily to the confidentiality and integrity of user sessions and data. Exploitation could allow attackers to steal authentication tokens, manipulate user interactions, or inject malicious content into web pages served by the API, undermining trust and potentially leading to further compromise. Organizations in sectors with high reliance on web-based APIs—such as finance, healthcare, and public services—may face increased risk due to the sensitive nature of data handled. Additionally, the vulnerability's remote exploitability without authentication broadens the attack surface, making it easier for threat actors to target multiple organizations. While availability impact is limited, the reputational damage and potential regulatory consequences under GDPR for data breaches caused by such attacks could be significant. The absence of known exploits in the wild currently reduces immediate threat levels but does not preclude future exploitation, especially given the public disclosure.
Mitigation Recommendations
Given the absence of an official patch, European organizations should prioritize the following specific mitigation measures: 1) Implement strict input validation and output encoding on all user-controllable fields, especially those related to homepage content or system settings, to neutralize malicious scripts. 2) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts within affected web contexts. 3) Conduct thorough code reviews and penetration testing focused on the System Setting Handler component to identify and remediate injection points. 4) Monitor web application logs for unusual or suspicious requests targeting the vulnerable parameters. 5) Isolate or restrict access to the one-api management interfaces to trusted networks or via VPN to reduce exposure. 6) Engage with the vendor or community for updates or patches and plan for timely deployment once available. 7) Educate developers and administrators about secure coding practices related to XSS prevention to avoid similar vulnerabilities in future versions.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2025-3801: Cross Site Scripting in songquanpeng one-api
Description
A vulnerability was found in songquanpeng one-api up to 0.6.10. It has been classified as problematic. This affects an unknown part of the component System Setting Handler. The manipulation of the argument Homepage Content/About System/Footer leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-3801 is a cross-site scripting (XSS) vulnerability identified in the songquanpeng one-api product, specifically affecting versions 0.6.0 through 0.6.10. The vulnerability resides in the System Setting Handler component, where manipulation of the 'Homepage Content/About System/Footer' argument allows an attacker to inject malicious scripts. This flaw enables remote exploitation without requiring authentication or user interaction, as the vulnerable parameter can be manipulated directly via crafted requests. The vulnerability is classified as problematic and has been publicly disclosed, although no known exploits have been observed in the wild yet. The nature of the vulnerability suggests that an attacker could execute arbitrary JavaScript in the context of users accessing the affected API or associated web interfaces, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of legitimate users. The lack of a patch or mitigation link indicates that remediation may not yet be available or publicly documented, increasing the urgency for affected organizations to implement compensating controls.
Potential Impact
For European organizations utilizing the songquanpeng one-api product, this XSS vulnerability poses a moderate risk primarily to the confidentiality and integrity of user sessions and data. Exploitation could allow attackers to steal authentication tokens, manipulate user interactions, or inject malicious content into web pages served by the API, undermining trust and potentially leading to further compromise. Organizations in sectors with high reliance on web-based APIs—such as finance, healthcare, and public services—may face increased risk due to the sensitive nature of data handled. Additionally, the vulnerability's remote exploitability without authentication broadens the attack surface, making it easier for threat actors to target multiple organizations. While availability impact is limited, the reputational damage and potential regulatory consequences under GDPR for data breaches caused by such attacks could be significant. The absence of known exploits in the wild currently reduces immediate threat levels but does not preclude future exploitation, especially given the public disclosure.
Mitigation Recommendations
Given the absence of an official patch, European organizations should prioritize the following specific mitigation measures: 1) Implement strict input validation and output encoding on all user-controllable fields, especially those related to homepage content or system settings, to neutralize malicious scripts. 2) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts within affected web contexts. 3) Conduct thorough code reviews and penetration testing focused on the System Setting Handler component to identify and remediate injection points. 4) Monitor web application logs for unusual or suspicious requests targeting the vulnerable parameters. 5) Isolate or restrict access to the one-api management interfaces to trusted networks or via VPN to reduce exposure. 6) Engage with the vendor or community for updates or patches and plan for timely deployment once available. 7) Educate developers and administrators about secure coding practices related to XSS prevention to avoid similar vulnerabilities in future versions.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-04-18T14:16:33.651Z
- Cisa Enriched
- true
Threat ID: 682d984bc4522896dcbf800d
Added to database: 5/21/2025, 9:09:31 AM
Last enriched: 6/20/2025, 1:04:58 PM
Last updated: 11/22/2025, 7:27:33 PM
Views: 46
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services
MediumCVE-2025-2655: SQL Injection in SourceCodester AC Repair and Services System
MediumCVE-2023-30806: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Sangfor Net-Gen Application Firewall
CriticalCVE-2024-0401: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ASUS ExpertWiFi
HighCVE-2024-23690: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Netgear FVS336Gv3
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.