Skip to main content

CVE-2025-5412: Cross Site Scripting in Mist Community Edition

Medium
VulnerabilityCVE-2025-5412cvecve-2025-5412
Published: Sun Jun 01 2025 (06/01/2025, 23:31:05 UTC)
Source: CVE Database V5
Vendor/Project: Mist
Product: Community Edition

Description

A vulnerability classified as problematic has been found in Mist Community Edition up to 4.7.1. Affected is the function Login of the file src/mist/api/views.py of the component Authentication Endpoint. The manipulation of the argument return_to leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.7.2 is able to address this issue. The name of the patch is db10ecb62ac832c1ed4924556d167efb9bc07fad. It is recommended to upgrade the affected component.

AI-Powered Analysis

AILast updated: 06/09/2025, 12:33:15 UTC

Technical Analysis

CVE-2025-5412 is a cross-site scripting (XSS) vulnerability identified in Mist Community Edition versions up to 4.7.1, specifically affecting the Login function within the src/mist/api/views.py file, which handles the Authentication Endpoint. The vulnerability arises from improper sanitization of the 'return_to' parameter, allowing an attacker to inject malicious scripts that execute in the context of the victim's browser. This flaw can be exploited remotely without requiring authentication, although user interaction is necessary to trigger the malicious payload (e.g., clicking a crafted link). The vulnerability is classified as problematic with a CVSS 4.0 base score of 5.1 (medium severity), reflecting moderate impact and ease of exploitation. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:L, indicating limited privileges but no authentication needed), and user interaction required (UI:P). The vulnerability impacts confidentiality and integrity to a limited extent by potentially stealing session tokens or performing actions on behalf of the user, but does not affect availability. A patch addressing this issue was released in version 4.7.2 (patch db10ecb62ac832c1ed4924556d167efb9bc07fad). No known exploits are currently observed in the wild, but public disclosure increases the risk of exploitation.

Potential Impact

For European organizations using Mist Community Edition up to version 4.7.1, this vulnerability poses a moderate risk primarily to web application security and user session integrity. Successful exploitation could lead to session hijacking, credential theft, or unauthorized actions performed under the guise of legitimate users, potentially compromising sensitive data and internal systems. Given that the vulnerability affects the authentication endpoint, attackers could target login workflows to capture credentials or redirect users to malicious sites. While the impact on availability is negligible, the breach of confidentiality and integrity could lead to reputational damage, regulatory non-compliance (e.g., GDPR violations), and financial losses. Organizations in sectors with high reliance on secure authentication, such as finance, healthcare, and critical infrastructure, are particularly at risk. The remote exploitability and lack of required privileges increase the attack surface, especially if users can be socially engineered to interact with malicious links.

Mitigation Recommendations

1. Immediate upgrade to Mist Community Edition version 4.7.2 or later to apply the official patch that sanitizes the 'return_to' parameter and eliminates the XSS vulnerability. 2. Implement strict Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of potential XSS attacks. 3. Employ web application firewalls (WAFs) configured to detect and block suspicious input patterns targeting the 'return_to' parameter or login endpoints. 4. Conduct regular security awareness training for users to recognize and avoid phishing attempts that could deliver malicious links exploiting this vulnerability. 5. Review and harden authentication workflows to include multi-factor authentication (MFA), reducing the risk of session hijacking even if credentials are compromised. 6. Monitor logs and network traffic for unusual activity around authentication endpoints to detect potential exploitation attempts early. 7. For organizations unable to upgrade immediately, consider temporarily disabling or restricting access to the vulnerable login endpoint or implementing input validation proxies as interim controls.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-05-31T16:51:19.004Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 683ce5b1182aa0cae229c28d

Added to database: 6/1/2025, 11:43:45 PM

Last enriched: 6/9/2025, 12:33:15 PM

Last updated: 7/9/2025, 3:51:43 AM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats