CVE-2025-54414: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in TecharoHQ anubis
Anubis is a Web AI Firewall Utility that weighs the soul of users' connections using one or more challenges in order to protect upstream resources from scraper bots. In versions 1.21.2 and below, attackers can craft malicious pass-challenge pages that cause a user to execute arbitrary JavaScript code or trigger other nonstandard schemes. An incomplete version of this fix was tagged at 1.21.2 and then the release process was aborted upon final testing. To work around this issue: block any requests to the /.within.website/x/cmd/anubis/api/pass-challenge route with the ?redir= parameter set to anything that doesn't start with the URL scheme http, https, or no scheme (local path redirect). This was fixed in version 1.21.3.
AI Analysis
Technical Summary
CVE-2025-54414 is a medium-severity vulnerability affecting TecharoHQ's Anubis Web AI Firewall Utility versions prior to 1.21.3. Anubis is designed to protect upstream web resources from scraper bots by challenging user connections. The vulnerability arises from improper neutralization of script-related HTML tags (CWE-80) and open redirect issues (CWE-601) in the pass-challenge page functionality. Specifically, attackers can craft malicious URLs targeting the /.within.website/x/cmd/anubis/api/pass-challenge endpoint with a ?redir= parameter that allows injection of arbitrary JavaScript code or triggers nonstandard URL schemes. This leads to a reflected Cross-Site Scripting (XSS) attack, enabling execution of arbitrary scripts in the context of the victim's browser. The vulnerability was partially addressed in version 1.21.2 but the fix was incomplete and the release was aborted. The definitive fix was introduced in version 1.21.3. The vulnerability does not require authentication (AV:N), has low attack complexity (AC:L), no privileges required (PR:N), but requires user interaction (UI:A). The impact on confidentiality and integrity is low, with no impact on availability. The scope is limited to the affected Anubis installations. The recommended workaround before patching is to block requests to the vulnerable endpoint when the ?redir= parameter is set to anything other than URLs starting with http, https, or local path redirects, preventing exploitation via malicious redirection or script injection.
Potential Impact
For European organizations using TecharoHQ Anubis versions below 1.21.3, this vulnerability could allow attackers to execute arbitrary JavaScript in users' browsers, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of users. While the direct impact on backend systems is limited, the exploitation of this XSS vulnerability could compromise user trust and lead to data leakage or phishing attacks. Organizations relying on Anubis for bot mitigation may see reduced effectiveness if attackers exploit this flaw to bypass protections or manipulate challenge pages. Given the medium severity and requirement for user interaction, the risk is moderate but significant in environments with high user traffic or sensitive data. The vulnerability could also be leveraged in targeted attacks against web applications protected by Anubis, especially if combined with social engineering to induce user clicks on malicious links.
Mitigation Recommendations
1. Immediately upgrade TecharoHQ Anubis to version 1.21.3 or later, where the vulnerability is fully patched. 2. Implement strict input validation and sanitization on the ?redir= parameter to accept only safe URL schemes (http, https) or local paths, blocking all others. 3. Configure web application firewalls (WAFs) or reverse proxies to detect and block requests to the /.within.website/x/cmd/anubis/api/pass-challenge endpoint with suspicious or malformed ?redir= parameters. 4. Employ Content Security Policy (CSP) headers to restrict the execution of inline scripts and reduce the impact of potential XSS attacks. 5. Conduct user awareness training to recognize suspicious URLs and avoid clicking on untrusted links. 6. Monitor logs for unusual access patterns or repeated requests to the vulnerable endpoint that could indicate exploitation attempts. 7. If upgrading immediately is not feasible, apply the recommended workaround by blocking requests with unsafe ?redir= parameter values at the network or application level.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-54414: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in TecharoHQ anubis
Description
Anubis is a Web AI Firewall Utility that weighs the soul of users' connections using one or more challenges in order to protect upstream resources from scraper bots. In versions 1.21.2 and below, attackers can craft malicious pass-challenge pages that cause a user to execute arbitrary JavaScript code or trigger other nonstandard schemes. An incomplete version of this fix was tagged at 1.21.2 and then the release process was aborted upon final testing. To work around this issue: block any requests to the /.within.website/x/cmd/anubis/api/pass-challenge route with the ?redir= parameter set to anything that doesn't start with the URL scheme http, https, or no scheme (local path redirect). This was fixed in version 1.21.3.
AI-Powered Analysis
Technical Analysis
CVE-2025-54414 is a medium-severity vulnerability affecting TecharoHQ's Anubis Web AI Firewall Utility versions prior to 1.21.3. Anubis is designed to protect upstream web resources from scraper bots by challenging user connections. The vulnerability arises from improper neutralization of script-related HTML tags (CWE-80) and open redirect issues (CWE-601) in the pass-challenge page functionality. Specifically, attackers can craft malicious URLs targeting the /.within.website/x/cmd/anubis/api/pass-challenge endpoint with a ?redir= parameter that allows injection of arbitrary JavaScript code or triggers nonstandard URL schemes. This leads to a reflected Cross-Site Scripting (XSS) attack, enabling execution of arbitrary scripts in the context of the victim's browser. The vulnerability was partially addressed in version 1.21.2 but the fix was incomplete and the release was aborted. The definitive fix was introduced in version 1.21.3. The vulnerability does not require authentication (AV:N), has low attack complexity (AC:L), no privileges required (PR:N), but requires user interaction (UI:A). The impact on confidentiality and integrity is low, with no impact on availability. The scope is limited to the affected Anubis installations. The recommended workaround before patching is to block requests to the vulnerable endpoint when the ?redir= parameter is set to anything other than URLs starting with http, https, or local path redirects, preventing exploitation via malicious redirection or script injection.
Potential Impact
For European organizations using TecharoHQ Anubis versions below 1.21.3, this vulnerability could allow attackers to execute arbitrary JavaScript in users' browsers, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of users. While the direct impact on backend systems is limited, the exploitation of this XSS vulnerability could compromise user trust and lead to data leakage or phishing attacks. Organizations relying on Anubis for bot mitigation may see reduced effectiveness if attackers exploit this flaw to bypass protections or manipulate challenge pages. Given the medium severity and requirement for user interaction, the risk is moderate but significant in environments with high user traffic or sensitive data. The vulnerability could also be leveraged in targeted attacks against web applications protected by Anubis, especially if combined with social engineering to induce user clicks on malicious links.
Mitigation Recommendations
1. Immediately upgrade TecharoHQ Anubis to version 1.21.3 or later, where the vulnerability is fully patched. 2. Implement strict input validation and sanitization on the ?redir= parameter to accept only safe URL schemes (http, https) or local paths, blocking all others. 3. Configure web application firewalls (WAFs) or reverse proxies to detect and block requests to the /.within.website/x/cmd/anubis/api/pass-challenge endpoint with suspicious or malformed ?redir= parameters. 4. Employ Content Security Policy (CSP) headers to restrict the execution of inline scripts and reduce the impact of potential XSS attacks. 5. Conduct user awareness training to recognize suspicious URLs and avoid clicking on untrusted links. 6. Monitor logs for unusual access patterns or repeated requests to the vulnerable endpoint that could indicate exploitation attempts. 7. If upgrading immediately is not feasible, apply the recommended workaround by blocking requests with unsafe ?redir= parameter values at the network or application level.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-07-21T23:18:10.280Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68844fe2ad5a09ad005a5aea
Added to database: 7/26/2025, 3:47:46 AM
Last enriched: 8/3/2025, 1:07:51 AM
Last updated: 9/7/2025, 12:01:40 PM
Views: 31
Related Threats
CVE-2025-41708: CWE-319 Cleartext Transmission of Sensitive Information in Bender CC612
HighCVE-2025-41682: CWE-522 Insufficiently Protected Credentials in Bender CC612
HighCVE-2025-41664: CWE-732 Incorrect Permission Assignment for Critical Resource in WAGO Coupler 0750-0362
HighCVE-2025-10087: SQL Injection in SourceCodester Pet Grooming Management Software
MediumCVE-2025-10081: Unrestricted Upload in SourceCodester Pet Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.