Skip to main content

CVE-2025-5412: Cross Site Scripting in Mist Community Edition

Medium
VulnerabilityCVE-2025-5412cvecve-2025-5412
Published: Sun Jun 01 2025 (06/01/2025, 23:31:05 UTC)
Source: CVE Database V5
Vendor/Project: Mist
Product: Community Edition

Description

A vulnerability classified as problematic has been found in Mist Community Edition up to 4.7.1. Affected is the function Login of the file src/mist/api/views.py of the component Authentication Endpoint. The manipulation of the argument return_to leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.7.2 is able to address this issue. The name of the patch is db10ecb62ac832c1ed4924556d167efb9bc07fad. It is recommended to upgrade the affected component.

AI-Powered Analysis

AILast updated: 07/09/2025, 13:11:07 UTC

Technical Analysis

CVE-2025-5412 is a cross-site scripting (XSS) vulnerability identified in the Mist Community Edition software, specifically affecting versions up to 4.7.1. The vulnerability resides in the Login function within the src/mist/api/views.py file, part of the Authentication Endpoint component. The issue arises due to improper handling and sanitization of the 'return_to' argument, which can be manipulated by an attacker to inject malicious scripts. This vulnerability is exploitable remotely without requiring authentication, although it does require user interaction (such as clicking a crafted link). The CVSS 4.0 base score is 5.1, indicating a medium severity level. The vector string indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), user interaction required (UI:P), and limited impact on confidentiality and integrity (VC:N, VI:L), with no impact on availability. The vulnerability does not involve scope or security requirements changes. Although no known exploits are currently in the wild, the exploit details have been publicly disclosed, increasing the risk of exploitation. The vendor has addressed the issue in version 4.7.2, and a patch identified by commit db10ecb62ac832c1ed4924556d167efb9bc07fad is available. XSS vulnerabilities like this can be leveraged to steal session cookies, perform phishing attacks, or execute arbitrary scripts in the context of the victim's browser, potentially leading to account compromise or unauthorized actions within the application.

Potential Impact

For European organizations using Mist Community Edition, this vulnerability poses a moderate risk. The primary impact is on the confidentiality and integrity of user sessions and data accessed through the affected authentication endpoint. Successful exploitation could allow attackers to hijack user sessions, redirect users to malicious sites, or perform actions on behalf of authenticated users, potentially leading to unauthorized access or data leakage. Organizations in sectors with sensitive data or regulatory requirements (such as finance, healthcare, or government) could face compliance issues if user data is compromised. Additionally, the remote exploitability without authentication increases the attack surface. However, the requirement for user interaction limits automated exploitation. The medium severity rating reflects these factors. Given the public disclosure of the exploit, European entities should prioritize remediation to prevent targeted attacks, especially in environments where Mist Community Edition is exposed to the internet or used by many users.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately upgrade Mist Community Edition to version 4.7.2 or later, where the issue has been patched. If upgrading is not immediately feasible, organizations should implement input validation and output encoding on the 'return_to' parameter to prevent script injection. Web application firewalls (WAFs) can be configured to detect and block suspicious payloads targeting this parameter. Additionally, organizations should educate users about the risks of clicking on untrusted links and monitor authentication logs for unusual activity that might indicate exploitation attempts. Regular security assessments and penetration testing focusing on authentication endpoints can help identify residual risks. Finally, organizations should ensure that their incident response plans include procedures for handling XSS incidents and potential session hijacking scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-05-31T16:51:19.004Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 683ce5b1182aa0cae229c28d

Added to database: 6/1/2025, 11:43:45 PM

Last enriched: 7/9/2025, 1:11:07 PM

Last updated: 7/31/2025, 4:28:02 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats