CVE-2025-5412: Cross Site Scripting in Mist Community Edition
A vulnerability classified as problematic has been found in Mist Community Edition up to 4.7.1. Affected is the function Login of the file src/mist/api/views.py of the component Authentication Endpoint. The manipulation of the argument return_to leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.7.2 is able to address this issue. The name of the patch is db10ecb62ac832c1ed4924556d167efb9bc07fad. It is recommended to upgrade the affected component.
AI Analysis
Technical Summary
CVE-2025-5412 is a cross-site scripting (XSS) vulnerability identified in the Mist Community Edition software, specifically affecting versions up to 4.7.1. The vulnerability resides in the Login function within the src/mist/api/views.py file, part of the Authentication Endpoint component. The issue arises due to improper handling and sanitization of the 'return_to' argument, which can be manipulated by an attacker to inject malicious scripts. This vulnerability is exploitable remotely without requiring authentication, although it does require user interaction (such as clicking a crafted link). The CVSS 4.0 base score is 5.1, indicating a medium severity level. The vector string indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), user interaction required (UI:P), and limited impact on confidentiality and integrity (VC:N, VI:L), with no impact on availability. The vulnerability does not involve scope or security requirements changes. Although no known exploits are currently in the wild, the exploit details have been publicly disclosed, increasing the risk of exploitation. The vendor has addressed the issue in version 4.7.2, and a patch identified by commit db10ecb62ac832c1ed4924556d167efb9bc07fad is available. XSS vulnerabilities like this can be leveraged to steal session cookies, perform phishing attacks, or execute arbitrary scripts in the context of the victim's browser, potentially leading to account compromise or unauthorized actions within the application.
Potential Impact
For European organizations using Mist Community Edition, this vulnerability poses a moderate risk. The primary impact is on the confidentiality and integrity of user sessions and data accessed through the affected authentication endpoint. Successful exploitation could allow attackers to hijack user sessions, redirect users to malicious sites, or perform actions on behalf of authenticated users, potentially leading to unauthorized access or data leakage. Organizations in sectors with sensitive data or regulatory requirements (such as finance, healthcare, or government) could face compliance issues if user data is compromised. Additionally, the remote exploitability without authentication increases the attack surface. However, the requirement for user interaction limits automated exploitation. The medium severity rating reflects these factors. Given the public disclosure of the exploit, European entities should prioritize remediation to prevent targeted attacks, especially in environments where Mist Community Edition is exposed to the internet or used by many users.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately upgrade Mist Community Edition to version 4.7.2 or later, where the issue has been patched. If upgrading is not immediately feasible, organizations should implement input validation and output encoding on the 'return_to' parameter to prevent script injection. Web application firewalls (WAFs) can be configured to detect and block suspicious payloads targeting this parameter. Additionally, organizations should educate users about the risks of clicking on untrusted links and monitor authentication logs for unusual activity that might indicate exploitation attempts. Regular security assessments and penetration testing focusing on authentication endpoints can help identify residual risks. Finally, organizations should ensure that their incident response plans include procedures for handling XSS incidents and potential session hijacking scenarios.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-5412: Cross Site Scripting in Mist Community Edition
Description
A vulnerability classified as problematic has been found in Mist Community Edition up to 4.7.1. Affected is the function Login of the file src/mist/api/views.py of the component Authentication Endpoint. The manipulation of the argument return_to leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.7.2 is able to address this issue. The name of the patch is db10ecb62ac832c1ed4924556d167efb9bc07fad. It is recommended to upgrade the affected component.
AI-Powered Analysis
Technical Analysis
CVE-2025-5412 is a cross-site scripting (XSS) vulnerability identified in the Mist Community Edition software, specifically affecting versions up to 4.7.1. The vulnerability resides in the Login function within the src/mist/api/views.py file, part of the Authentication Endpoint component. The issue arises due to improper handling and sanitization of the 'return_to' argument, which can be manipulated by an attacker to inject malicious scripts. This vulnerability is exploitable remotely without requiring authentication, although it does require user interaction (such as clicking a crafted link). The CVSS 4.0 base score is 5.1, indicating a medium severity level. The vector string indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), user interaction required (UI:P), and limited impact on confidentiality and integrity (VC:N, VI:L), with no impact on availability. The vulnerability does not involve scope or security requirements changes. Although no known exploits are currently in the wild, the exploit details have been publicly disclosed, increasing the risk of exploitation. The vendor has addressed the issue in version 4.7.2, and a patch identified by commit db10ecb62ac832c1ed4924556d167efb9bc07fad is available. XSS vulnerabilities like this can be leveraged to steal session cookies, perform phishing attacks, or execute arbitrary scripts in the context of the victim's browser, potentially leading to account compromise or unauthorized actions within the application.
Potential Impact
For European organizations using Mist Community Edition, this vulnerability poses a moderate risk. The primary impact is on the confidentiality and integrity of user sessions and data accessed through the affected authentication endpoint. Successful exploitation could allow attackers to hijack user sessions, redirect users to malicious sites, or perform actions on behalf of authenticated users, potentially leading to unauthorized access or data leakage. Organizations in sectors with sensitive data or regulatory requirements (such as finance, healthcare, or government) could face compliance issues if user data is compromised. Additionally, the remote exploitability without authentication increases the attack surface. However, the requirement for user interaction limits automated exploitation. The medium severity rating reflects these factors. Given the public disclosure of the exploit, European entities should prioritize remediation to prevent targeted attacks, especially in environments where Mist Community Edition is exposed to the internet or used by many users.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately upgrade Mist Community Edition to version 4.7.2 or later, where the issue has been patched. If upgrading is not immediately feasible, organizations should implement input validation and output encoding on the 'return_to' parameter to prevent script injection. Web application firewalls (WAFs) can be configured to detect and block suspicious payloads targeting this parameter. Additionally, organizations should educate users about the risks of clicking on untrusted links and monitor authentication logs for unusual activity that might indicate exploitation attempts. Regular security assessments and penetration testing focusing on authentication endpoints can help identify residual risks. Finally, organizations should ensure that their incident response plans include procedures for handling XSS incidents and potential session hijacking scenarios.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-05-31T16:51:19.004Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 683ce5b1182aa0cae229c28d
Added to database: 6/1/2025, 11:43:45 PM
Last enriched: 7/9/2025, 1:11:07 PM
Last updated: 7/31/2025, 4:28:02 PM
Views: 12
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.