Skip to main content

CVE-2025-54414: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in TecharoHQ anubis

Medium
VulnerabilityCVE-2025-54414cvecve-2025-54414cwe-80cwe-601
Published: Sat Jul 26 2025 (07/26/2025, 03:30:28 UTC)
Source: CVE Database V5
Vendor/Project: TecharoHQ
Product: anubis

Description

Anubis is a Web AI Firewall Utility that weighs the soul of users' connections using one or more challenges in order to protect upstream resources from scraper bots. In versions 1.21.2 and below, attackers can craft malicious pass-challenge pages that cause a user to execute arbitrary JavaScript code or trigger other nonstandard schemes. An incomplete version of this fix was tagged at 1.21.2 and then the release process was aborted upon final testing. To work around this issue: block any requests to the /.within.website/x/cmd/anubis/api/pass-challenge route with the ?redir= parameter set to anything that doesn't start with the URL scheme http, https, or no scheme (local path redirect). This was fixed in version 1.21.3.

AI-Powered Analysis

AILast updated: 07/26/2025, 04:04:25 UTC

Technical Analysis

CVE-2025-54414 is a medium-severity vulnerability affecting TecharoHQ's Anubis Web AI Firewall Utility versions prior to 1.21.3. Anubis is designed to protect upstream web resources from scraper bots by challenging user connections. The vulnerability arises from improper neutralization of script-related HTML tags (CWE-80) combined with an open redirect issue (CWE-601) in the pass-challenge mechanism. Specifically, attackers can craft malicious pass-challenge pages targeting the endpoint /.within.website/x/cmd/anubis/api/pass-challenge with a ?redir= parameter that allows arbitrary JavaScript execution or triggering of nonstandard URI schemes. This occurs because the input validation on the ?redir= parameter is insufficient, allowing redirection to URLs with schemes other than http, https, or local paths, enabling cross-site scripting (XSS) attacks. The vulnerability was partially addressed in version 1.21.2 but the fix was incomplete and the release aborted. The issue was fully resolved in version 1.21.3. Exploitation requires user interaction (the user must access the crafted URL), but no authentication or privileges are needed, and the attack vector is network accessible. The CVSS 4.0 score is 5.1 (medium), reflecting the moderate impact on confidentiality and integrity with limited availability impact. No known exploits are currently in the wild. The vulnerability could be leveraged to execute arbitrary JavaScript in the context of the vulnerable web application, potentially leading to session hijacking, credential theft, or further attacks against users or backend systems.

Potential Impact

For European organizations using TecharoHQ's Anubis firewall utility, this vulnerability poses a risk of client-side script injection that can compromise user sessions and data confidentiality. Since Anubis is positioned as a protective layer against scraper bots, a successful XSS attack could undermine trust in the security controls and potentially allow attackers to bypass protections or manipulate user interactions. This could lead to data leakage, unauthorized actions performed on behalf of users, or the spread of malware through injected scripts. Organizations relying on Anubis to secure sensitive web applications or APIs may face reputational damage and regulatory scrutiny under GDPR if user data is compromised. The medium severity suggests that while the threat is not critical, it is significant enough to warrant prompt remediation to prevent exploitation, especially in sectors with high compliance requirements such as finance, healthcare, and government services prevalent in Europe.

Mitigation Recommendations

1. Upgrade Anubis to version 1.21.3 or later immediately, as this version contains the complete fix for the vulnerability. 2. Until the upgrade can be performed, implement a strict web application firewall (WAF) or reverse proxy rule to block requests to the /.within.website/x/cmd/anubis/api/pass-challenge endpoint where the ?redir= parameter contains URL schemes other than http, https, or local paths. 3. Conduct thorough input validation and sanitization on all user-controllable parameters, especially those involved in redirection or challenge-response flows. 4. Monitor web server and application logs for suspicious requests targeting the vulnerable endpoint to detect potential exploitation attempts. 5. Educate users about the risks of clicking on untrusted links and implement Content Security Policy (CSP) headers to reduce the impact of potential XSS attacks. 6. Perform regular security assessments and penetration testing focused on client-side injection vulnerabilities in web-facing components.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-07-21T23:18:10.280Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68844fe2ad5a09ad005a5aea

Added to database: 7/26/2025, 3:47:46 AM

Last enriched: 7/26/2025, 4:04:25 AM

Last updated: 7/26/2025, 4:04:25 AM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats