Skip to main content

CVE-2025-54414: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in TecharoHQ anubis

Medium
VulnerabilityCVE-2025-54414cvecve-2025-54414cwe-80cwe-601
Published: Sat Jul 26 2025 (07/26/2025, 03:30:28 UTC)
Source: CVE Database V5
Vendor/Project: TecharoHQ
Product: anubis

Description

Anubis is a Web AI Firewall Utility that weighs the soul of users' connections using one or more challenges in order to protect upstream resources from scraper bots. In versions 1.21.2 and below, attackers can craft malicious pass-challenge pages that cause a user to execute arbitrary JavaScript code or trigger other nonstandard schemes. An incomplete version of this fix was tagged at 1.21.2 and then the release process was aborted upon final testing. To work around this issue: block any requests to the /.within.website/x/cmd/anubis/api/pass-challenge route with the ?redir= parameter set to anything that doesn't start with the URL scheme http, https, or no scheme (local path redirect). This was fixed in version 1.21.3.

AI-Powered Analysis

AILast updated: 08/03/2025, 01:07:51 UTC

Technical Analysis

CVE-2025-54414 is a medium-severity vulnerability affecting TecharoHQ's Anubis Web AI Firewall Utility versions prior to 1.21.3. Anubis is designed to protect upstream web resources from scraper bots by challenging user connections. The vulnerability arises from improper neutralization of script-related HTML tags (CWE-80) and open redirect issues (CWE-601) in the pass-challenge page functionality. Specifically, attackers can craft malicious URLs targeting the /.within.website/x/cmd/anubis/api/pass-challenge endpoint with a ?redir= parameter that allows injection of arbitrary JavaScript code or triggers nonstandard URL schemes. This leads to a reflected Cross-Site Scripting (XSS) attack, enabling execution of arbitrary scripts in the context of the victim's browser. The vulnerability was partially addressed in version 1.21.2 but the fix was incomplete and the release was aborted. The definitive fix was introduced in version 1.21.3. The vulnerability does not require authentication (AV:N), has low attack complexity (AC:L), no privileges required (PR:N), but requires user interaction (UI:A). The impact on confidentiality and integrity is low, with no impact on availability. The scope is limited to the affected Anubis installations. The recommended workaround before patching is to block requests to the vulnerable endpoint when the ?redir= parameter is set to anything other than URLs starting with http, https, or local path redirects, preventing exploitation via malicious redirection or script injection.

Potential Impact

For European organizations using TecharoHQ Anubis versions below 1.21.3, this vulnerability could allow attackers to execute arbitrary JavaScript in users' browsers, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of users. While the direct impact on backend systems is limited, the exploitation of this XSS vulnerability could compromise user trust and lead to data leakage or phishing attacks. Organizations relying on Anubis for bot mitigation may see reduced effectiveness if attackers exploit this flaw to bypass protections or manipulate challenge pages. Given the medium severity and requirement for user interaction, the risk is moderate but significant in environments with high user traffic or sensitive data. The vulnerability could also be leveraged in targeted attacks against web applications protected by Anubis, especially if combined with social engineering to induce user clicks on malicious links.

Mitigation Recommendations

1. Immediately upgrade TecharoHQ Anubis to version 1.21.3 or later, where the vulnerability is fully patched. 2. Implement strict input validation and sanitization on the ?redir= parameter to accept only safe URL schemes (http, https) or local paths, blocking all others. 3. Configure web application firewalls (WAFs) or reverse proxies to detect and block requests to the /.within.website/x/cmd/anubis/api/pass-challenge endpoint with suspicious or malformed ?redir= parameters. 4. Employ Content Security Policy (CSP) headers to restrict the execution of inline scripts and reduce the impact of potential XSS attacks. 5. Conduct user awareness training to recognize suspicious URLs and avoid clicking on untrusted links. 6. Monitor logs for unusual access patterns or repeated requests to the vulnerable endpoint that could indicate exploitation attempts. 7. If upgrading immediately is not feasible, apply the recommended workaround by blocking requests with unsafe ?redir= parameter values at the network or application level.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-07-21T23:18:10.280Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68844fe2ad5a09ad005a5aea

Added to database: 7/26/2025, 3:47:46 AM

Last enriched: 8/3/2025, 1:07:51 AM

Last updated: 9/7/2025, 12:01:40 PM

Views: 31

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats