CVE-2025-46559: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in misskey-dev misskey
Misskey is an open source, federated social media platform. Starting in version 12.31.0 and prior to version 2025.4.1, missing validation in `Mk:api` allows malicious AiScript code to access additional endpoints that it isn't designed to have access to. The missing validation allows malicious AiScript code to prefix a URL with `../` to step out of the `/api` directory, thereby being able to make requests to other endpoints, such as `/files`, `/url`, and `/proxy`. Version 2025.4.1 fixes the issue.
AI Analysis
Technical Summary
CVE-2025-46559 is a medium severity path traversal vulnerability affecting the Misskey open source federated social media platform, specifically versions from 12.31.0 up to but not including 2025.4.1. The vulnerability arises due to improper validation in the Mk:api component, which handles AiScript code requests. Malicious AiScript code can exploit this flaw by prefixing URLs with '../' sequences, effectively escaping the intended '/api' directory restriction. This allows unauthorized access to other endpoints such as '/files', '/url', and '/proxy' that were not meant to be accessible via the Mk:api interface. The vulnerability is classified under CWE-22, indicating improper limitation of a pathname to a restricted directory. Exploitation requires a low privilege user with some level of authentication and user interaction, as indicated by the CVSS vector (AV:N/AC:H/PR:L/UI:R). The impact includes limited confidentiality loss (exposure of unauthorized data) and high integrity impact (potential manipulation of endpoints or data). Availability impact is not significant. The vulnerability was addressed and fixed in version 2025.4.1 of Misskey. There are no known exploits in the wild as of the publication date, but the vulnerability presents a risk to deployments running affected versions. Given Misskey’s federated nature, a compromised instance could be leveraged to attack other federated nodes or leak sensitive user data. The vulnerability’s network attack vector and requirement for user interaction and low privilege authentication reduce but do not eliminate risk, especially in environments where user trust boundaries are weak or where malicious insiders exist.
Potential Impact
For European organizations using Misskey as a federated social media platform, this vulnerability could lead to unauthorized access to sensitive endpoints, potentially exposing user data or enabling manipulation of platform functionality. Given the federated architecture, a compromised node could impact the broader network of interconnected instances, amplifying the threat. This could undermine user trust, violate data protection regulations such as GDPR, and lead to reputational damage. Organizations relying on Misskey for internal or community communications may face data integrity issues or unauthorized data disclosure. The medium CVSS score reflects moderate risk, but the potential for high integrity impact and confidentiality loss means organizations should prioritize remediation. The requirement for user interaction and low privilege authentication suggests that social engineering or insider threats could facilitate exploitation. European entities with public-facing or widely accessible Misskey instances are particularly at risk.
Mitigation Recommendations
Organizations should immediately upgrade all Misskey deployments to version 2025.4.1 or later, where the vulnerability is patched. Until upgrades are applied, administrators should restrict access to the Mk:api interface to trusted users only and monitor logs for suspicious '../' path traversal patterns or unexpected endpoint access. Implement strict input validation and sanitization on all AiScript code inputs to prevent directory traversal sequences. Employ network segmentation to isolate Misskey servers from critical infrastructure and limit exposure. Conduct user training to reduce the risk of social engineering attacks that could facilitate exploitation. Additionally, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block path traversal attempts targeting the Mk:api endpoints. Regularly audit federated connections and monitor for anomalous behavior that could indicate compromise. Finally, maintain an incident response plan tailored to federated social media platforms to quickly contain and remediate any exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Norway
CVE-2025-46559: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in misskey-dev misskey
Description
Misskey is an open source, federated social media platform. Starting in version 12.31.0 and prior to version 2025.4.1, missing validation in `Mk:api` allows malicious AiScript code to access additional endpoints that it isn't designed to have access to. The missing validation allows malicious AiScript code to prefix a URL with `../` to step out of the `/api` directory, thereby being able to make requests to other endpoints, such as `/files`, `/url`, and `/proxy`. Version 2025.4.1 fixes the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-46559 is a medium severity path traversal vulnerability affecting the Misskey open source federated social media platform, specifically versions from 12.31.0 up to but not including 2025.4.1. The vulnerability arises due to improper validation in the Mk:api component, which handles AiScript code requests. Malicious AiScript code can exploit this flaw by prefixing URLs with '../' sequences, effectively escaping the intended '/api' directory restriction. This allows unauthorized access to other endpoints such as '/files', '/url', and '/proxy' that were not meant to be accessible via the Mk:api interface. The vulnerability is classified under CWE-22, indicating improper limitation of a pathname to a restricted directory. Exploitation requires a low privilege user with some level of authentication and user interaction, as indicated by the CVSS vector (AV:N/AC:H/PR:L/UI:R). The impact includes limited confidentiality loss (exposure of unauthorized data) and high integrity impact (potential manipulation of endpoints or data). Availability impact is not significant. The vulnerability was addressed and fixed in version 2025.4.1 of Misskey. There are no known exploits in the wild as of the publication date, but the vulnerability presents a risk to deployments running affected versions. Given Misskey’s federated nature, a compromised instance could be leveraged to attack other federated nodes or leak sensitive user data. The vulnerability’s network attack vector and requirement for user interaction and low privilege authentication reduce but do not eliminate risk, especially in environments where user trust boundaries are weak or where malicious insiders exist.
Potential Impact
For European organizations using Misskey as a federated social media platform, this vulnerability could lead to unauthorized access to sensitive endpoints, potentially exposing user data or enabling manipulation of platform functionality. Given the federated architecture, a compromised node could impact the broader network of interconnected instances, amplifying the threat. This could undermine user trust, violate data protection regulations such as GDPR, and lead to reputational damage. Organizations relying on Misskey for internal or community communications may face data integrity issues or unauthorized data disclosure. The medium CVSS score reflects moderate risk, but the potential for high integrity impact and confidentiality loss means organizations should prioritize remediation. The requirement for user interaction and low privilege authentication suggests that social engineering or insider threats could facilitate exploitation. European entities with public-facing or widely accessible Misskey instances are particularly at risk.
Mitigation Recommendations
Organizations should immediately upgrade all Misskey deployments to version 2025.4.1 or later, where the vulnerability is patched. Until upgrades are applied, administrators should restrict access to the Mk:api interface to trusted users only and monitor logs for suspicious '../' path traversal patterns or unexpected endpoint access. Implement strict input validation and sanitization on all AiScript code inputs to prevent directory traversal sequences. Employ network segmentation to isolate Misskey servers from critical infrastructure and limit exposure. Conduct user training to reduce the risk of social engineering attacks that could facilitate exploitation. Additionally, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block path traversal attempts targeting the Mk:api endpoints. Regularly audit federated connections and monitor for anomalous behavior that could indicate compromise. Finally, maintain an incident response plan tailored to federated social media platforms to quickly contain and remediate any exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-04-24T21:10:48.173Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981dc4522896dcbdaf20
Added to database: 5/21/2025, 9:08:45 AM
Last enriched: 7/6/2025, 8:27:44 PM
Last updated: 7/29/2025, 5:27:53 PM
Views: 8
Related Threats
CVE-2025-8985: SQL Injection in SourceCodester COVID 19 Testing Management System
MediumCVE-2025-8984: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-8983: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-8982: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-8981: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.