CVE-2025-5412: Cross Site Scripting in Mist Community Edition
A vulnerability classified as problematic has been found in Mist Community Edition up to 4.7.1. Affected is the function Login of the file src/mist/api/views.py of the component Authentication Endpoint. The manipulation of the argument return_to leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.7.2 is able to address this issue. The name of the patch is db10ecb62ac832c1ed4924556d167efb9bc07fad. It is recommended to upgrade the affected component.
AI Analysis
Technical Summary
CVE-2025-5412 is a cross-site scripting (XSS) vulnerability identified in Mist Community Edition versions up to 4.7.1, specifically affecting the Login function within the src/mist/api/views.py file, which handles the Authentication Endpoint. The vulnerability arises from improper sanitization of the 'return_to' parameter, allowing an attacker to inject malicious scripts that execute in the context of the victim's browser. This flaw can be exploited remotely without requiring authentication, although user interaction is necessary to trigger the malicious payload (e.g., clicking a crafted link). The vulnerability is classified as problematic with a CVSS 4.0 base score of 5.1 (medium severity), reflecting moderate impact and ease of exploitation. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:L, indicating limited privileges but no authentication needed), and user interaction required (UI:P). The vulnerability impacts confidentiality and integrity to a limited extent by potentially stealing session tokens or performing actions on behalf of the user, but does not affect availability. A patch addressing this issue was released in version 4.7.2 (patch db10ecb62ac832c1ed4924556d167efb9bc07fad). No known exploits are currently observed in the wild, but public disclosure increases the risk of exploitation.
Potential Impact
For European organizations using Mist Community Edition up to version 4.7.1, this vulnerability poses a moderate risk primarily to web application security and user session integrity. Successful exploitation could lead to session hijacking, credential theft, or unauthorized actions performed under the guise of legitimate users, potentially compromising sensitive data and internal systems. Given that the vulnerability affects the authentication endpoint, attackers could target login workflows to capture credentials or redirect users to malicious sites. While the impact on availability is negligible, the breach of confidentiality and integrity could lead to reputational damage, regulatory non-compliance (e.g., GDPR violations), and financial losses. Organizations in sectors with high reliance on secure authentication, such as finance, healthcare, and critical infrastructure, are particularly at risk. The remote exploitability and lack of required privileges increase the attack surface, especially if users can be socially engineered to interact with malicious links.
Mitigation Recommendations
1. Immediate upgrade to Mist Community Edition version 4.7.2 or later to apply the official patch that sanitizes the 'return_to' parameter and eliminates the XSS vulnerability. 2. Implement strict Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of potential XSS attacks. 3. Employ web application firewalls (WAFs) configured to detect and block suspicious input patterns targeting the 'return_to' parameter or login endpoints. 4. Conduct regular security awareness training for users to recognize and avoid phishing attempts that could deliver malicious links exploiting this vulnerability. 5. Review and harden authentication workflows to include multi-factor authentication (MFA), reducing the risk of session hijacking even if credentials are compromised. 6. Monitor logs and network traffic for unusual activity around authentication endpoints to detect potential exploitation attempts early. 7. For organizations unable to upgrade immediately, consider temporarily disabling or restricting access to the vulnerable login endpoint or implementing input validation proxies as interim controls.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Finland
CVE-2025-5412: Cross Site Scripting in Mist Community Edition
Description
A vulnerability classified as problematic has been found in Mist Community Edition up to 4.7.1. Affected is the function Login of the file src/mist/api/views.py of the component Authentication Endpoint. The manipulation of the argument return_to leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.7.2 is able to address this issue. The name of the patch is db10ecb62ac832c1ed4924556d167efb9bc07fad. It is recommended to upgrade the affected component.
AI-Powered Analysis
Technical Analysis
CVE-2025-5412 is a cross-site scripting (XSS) vulnerability identified in Mist Community Edition versions up to 4.7.1, specifically affecting the Login function within the src/mist/api/views.py file, which handles the Authentication Endpoint. The vulnerability arises from improper sanitization of the 'return_to' parameter, allowing an attacker to inject malicious scripts that execute in the context of the victim's browser. This flaw can be exploited remotely without requiring authentication, although user interaction is necessary to trigger the malicious payload (e.g., clicking a crafted link). The vulnerability is classified as problematic with a CVSS 4.0 base score of 5.1 (medium severity), reflecting moderate impact and ease of exploitation. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:L, indicating limited privileges but no authentication needed), and user interaction required (UI:P). The vulnerability impacts confidentiality and integrity to a limited extent by potentially stealing session tokens or performing actions on behalf of the user, but does not affect availability. A patch addressing this issue was released in version 4.7.2 (patch db10ecb62ac832c1ed4924556d167efb9bc07fad). No known exploits are currently observed in the wild, but public disclosure increases the risk of exploitation.
Potential Impact
For European organizations using Mist Community Edition up to version 4.7.1, this vulnerability poses a moderate risk primarily to web application security and user session integrity. Successful exploitation could lead to session hijacking, credential theft, or unauthorized actions performed under the guise of legitimate users, potentially compromising sensitive data and internal systems. Given that the vulnerability affects the authentication endpoint, attackers could target login workflows to capture credentials or redirect users to malicious sites. While the impact on availability is negligible, the breach of confidentiality and integrity could lead to reputational damage, regulatory non-compliance (e.g., GDPR violations), and financial losses. Organizations in sectors with high reliance on secure authentication, such as finance, healthcare, and critical infrastructure, are particularly at risk. The remote exploitability and lack of required privileges increase the attack surface, especially if users can be socially engineered to interact with malicious links.
Mitigation Recommendations
1. Immediate upgrade to Mist Community Edition version 4.7.2 or later to apply the official patch that sanitizes the 'return_to' parameter and eliminates the XSS vulnerability. 2. Implement strict Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of potential XSS attacks. 3. Employ web application firewalls (WAFs) configured to detect and block suspicious input patterns targeting the 'return_to' parameter or login endpoints. 4. Conduct regular security awareness training for users to recognize and avoid phishing attempts that could deliver malicious links exploiting this vulnerability. 5. Review and harden authentication workflows to include multi-factor authentication (MFA), reducing the risk of session hijacking even if credentials are compromised. 6. Monitor logs and network traffic for unusual activity around authentication endpoints to detect potential exploitation attempts early. 7. For organizations unable to upgrade immediately, consider temporarily disabling or restricting access to the vulnerable login endpoint or implementing input validation proxies as interim controls.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-05-31T16:51:19.004Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 683ce5b1182aa0cae229c28d
Added to database: 6/1/2025, 11:43:45 PM
Last enriched: 6/9/2025, 12:33:15 PM
Last updated: 7/9/2025, 3:51:43 AM
Views: 6
Related Threats
CVE-2025-3499: CWE-78: Improper Neutralization of Special Elements used in an OS Command (’OS Command Injection’) in Radiflow iSAP Smart Collector
CriticalCVE-2025-3498: CWE-306: Missing Authentication for Critical Function in Radiflow iSAP Smart Collector
CriticalCVE-2025-27028: CWE-266: Incorrect Privilege Assignment in Radiflow iSAP Smart Collector
MediumCVE-2025-27027: CWE-653 Improper Isolation or Compartmentalization in Radiflow iSAP Smart Collector
MediumCVE-2025-7379: CWE-352 Cross-Site Request Forgery (CSRF) in ASUSTOR ADM
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.