CVE-2025-54414: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in TecharoHQ anubis
Anubis is a Web AI Firewall Utility that weighs the soul of users' connections using one or more challenges in order to protect upstream resources from scraper bots. In versions 1.21.2 and below, attackers can craft malicious pass-challenge pages that cause a user to execute arbitrary JavaScript code or trigger other nonstandard schemes. An incomplete version of this fix was tagged at 1.21.2 and then the release process was aborted upon final testing. To work around this issue: block any requests to the /.within.website/x/cmd/anubis/api/pass-challenge route with the ?redir= parameter set to anything that doesn't start with the URL scheme http, https, or no scheme (local path redirect). This was fixed in version 1.21.3.
AI Analysis
Technical Summary
CVE-2025-54414 is a medium-severity vulnerability affecting TecharoHQ's Anubis Web AI Firewall Utility versions prior to 1.21.3. Anubis is designed to protect upstream web resources from scraper bots by challenging user connections. The vulnerability arises from improper neutralization of script-related HTML tags (CWE-80) and open redirect issues (CWE-601) in the pass-challenge page functionality. Specifically, attackers can craft malicious URLs targeting the /.within.website/x/cmd/anubis/api/pass-challenge endpoint with a ?redir= parameter that allows injection of arbitrary JavaScript code or triggers nonstandard URL schemes. This leads to a reflected Cross-Site Scripting (XSS) attack, enabling execution of arbitrary scripts in the context of the victim's browser. The vulnerability was partially addressed in version 1.21.2 but the fix was incomplete and the release was aborted. The definitive fix was introduced in version 1.21.3. The vulnerability does not require authentication (AV:N), has low attack complexity (AC:L), no privileges required (PR:N), but requires user interaction (UI:A). The impact on confidentiality and integrity is low, with no impact on availability. The scope is limited to the affected Anubis installations. The recommended workaround before patching is to block requests to the vulnerable endpoint when the ?redir= parameter is set to anything other than URLs starting with http, https, or local path redirects, preventing exploitation via malicious redirection or script injection.
Potential Impact
For European organizations using TecharoHQ Anubis versions below 1.21.3, this vulnerability could allow attackers to execute arbitrary JavaScript in users' browsers, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of users. While the direct impact on backend systems is limited, the exploitation of this XSS vulnerability could compromise user trust and lead to data leakage or phishing attacks. Organizations relying on Anubis for bot mitigation may see reduced effectiveness if attackers exploit this flaw to bypass protections or manipulate challenge pages. Given the medium severity and requirement for user interaction, the risk is moderate but significant in environments with high user traffic or sensitive data. The vulnerability could also be leveraged in targeted attacks against web applications protected by Anubis, especially if combined with social engineering to induce user clicks on malicious links.
Mitigation Recommendations
1. Immediately upgrade TecharoHQ Anubis to version 1.21.3 or later, where the vulnerability is fully patched. 2. Implement strict input validation and sanitization on the ?redir= parameter to accept only safe URL schemes (http, https) or local paths, blocking all others. 3. Configure web application firewalls (WAFs) or reverse proxies to detect and block requests to the /.within.website/x/cmd/anubis/api/pass-challenge endpoint with suspicious or malformed ?redir= parameters. 4. Employ Content Security Policy (CSP) headers to restrict the execution of inline scripts and reduce the impact of potential XSS attacks. 5. Conduct user awareness training to recognize suspicious URLs and avoid clicking on untrusted links. 6. Monitor logs for unusual access patterns or repeated requests to the vulnerable endpoint that could indicate exploitation attempts. 7. If upgrading immediately is not feasible, apply the recommended workaround by blocking requests with unsafe ?redir= parameter values at the network or application level.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-54414: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in TecharoHQ anubis
Description
Anubis is a Web AI Firewall Utility that weighs the soul of users' connections using one or more challenges in order to protect upstream resources from scraper bots. In versions 1.21.2 and below, attackers can craft malicious pass-challenge pages that cause a user to execute arbitrary JavaScript code or trigger other nonstandard schemes. An incomplete version of this fix was tagged at 1.21.2 and then the release process was aborted upon final testing. To work around this issue: block any requests to the /.within.website/x/cmd/anubis/api/pass-challenge route with the ?redir= parameter set to anything that doesn't start with the URL scheme http, https, or no scheme (local path redirect). This was fixed in version 1.21.3.
AI-Powered Analysis
Technical Analysis
CVE-2025-54414 is a medium-severity vulnerability affecting TecharoHQ's Anubis Web AI Firewall Utility versions prior to 1.21.3. Anubis is designed to protect upstream web resources from scraper bots by challenging user connections. The vulnerability arises from improper neutralization of script-related HTML tags (CWE-80) and open redirect issues (CWE-601) in the pass-challenge page functionality. Specifically, attackers can craft malicious URLs targeting the /.within.website/x/cmd/anubis/api/pass-challenge endpoint with a ?redir= parameter that allows injection of arbitrary JavaScript code or triggers nonstandard URL schemes. This leads to a reflected Cross-Site Scripting (XSS) attack, enabling execution of arbitrary scripts in the context of the victim's browser. The vulnerability was partially addressed in version 1.21.2 but the fix was incomplete and the release was aborted. The definitive fix was introduced in version 1.21.3. The vulnerability does not require authentication (AV:N), has low attack complexity (AC:L), no privileges required (PR:N), but requires user interaction (UI:A). The impact on confidentiality and integrity is low, with no impact on availability. The scope is limited to the affected Anubis installations. The recommended workaround before patching is to block requests to the vulnerable endpoint when the ?redir= parameter is set to anything other than URLs starting with http, https, or local path redirects, preventing exploitation via malicious redirection or script injection.
Potential Impact
For European organizations using TecharoHQ Anubis versions below 1.21.3, this vulnerability could allow attackers to execute arbitrary JavaScript in users' browsers, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of users. While the direct impact on backend systems is limited, the exploitation of this XSS vulnerability could compromise user trust and lead to data leakage or phishing attacks. Organizations relying on Anubis for bot mitigation may see reduced effectiveness if attackers exploit this flaw to bypass protections or manipulate challenge pages. Given the medium severity and requirement for user interaction, the risk is moderate but significant in environments with high user traffic or sensitive data. The vulnerability could also be leveraged in targeted attacks against web applications protected by Anubis, especially if combined with social engineering to induce user clicks on malicious links.
Mitigation Recommendations
1. Immediately upgrade TecharoHQ Anubis to version 1.21.3 or later, where the vulnerability is fully patched. 2. Implement strict input validation and sanitization on the ?redir= parameter to accept only safe URL schemes (http, https) or local paths, blocking all others. 3. Configure web application firewalls (WAFs) or reverse proxies to detect and block requests to the /.within.website/x/cmd/anubis/api/pass-challenge endpoint with suspicious or malformed ?redir= parameters. 4. Employ Content Security Policy (CSP) headers to restrict the execution of inline scripts and reduce the impact of potential XSS attacks. 5. Conduct user awareness training to recognize suspicious URLs and avoid clicking on untrusted links. 6. Monitor logs for unusual access patterns or repeated requests to the vulnerable endpoint that could indicate exploitation attempts. 7. If upgrading immediately is not feasible, apply the recommended workaround by blocking requests with unsafe ?redir= parameter values at the network or application level.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-07-21T23:18:10.280Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68844fe2ad5a09ad005a5aea
Added to database: 7/26/2025, 3:47:46 AM
Last enriched: 8/3/2025, 1:07:51 AM
Last updated: 10/30/2025, 2:19:30 PM
Views: 59
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-43941: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Dell Unity
HighX-Request-Purpose: Identifying "research" and bug bounty related scans?, (Thu, Oct 30th)
MediumCVE-2025-10348: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Eveo URVE Smart Office
MediumMillions Impacted by Conduent Data Breach
MediumCVE-2025-63608: n/a
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.