Skip to main content

CVE-2025-54872: CWE-798: Use of Hard-coded Credentials in Vessel9817 onion-site-template

High
VulnerabilityCVE-2025-54872cvecve-2025-54872cwe-798
Published: Tue Aug 05 2025 (08/05/2025, 23:40:46 UTC)
Source: CVE Database V5
Vendor/Project: Vessel9817
Product: onion-site-template

Description

onion-site-template is a complete, scalable tor hidden service self-hosting sample. Versions which include commit 3196bd89 contain a baked-in tor image if the secrets were copied from an existing onion domain. A website could be compromised if a user shared the baked-in image, or if someone were able to acquire access to the user's device outside of a containerized environment. This is fixed by commit bc9ba0fd.

AI-Powered Analysis

AILast updated: 08/13/2025, 01:08:48 UTC

Technical Analysis

CVE-2025-54872 is a high-severity vulnerability identified in the Vessel9817 project's onion-site-template, a scalable Tor hidden service self-hosting sample. The vulnerability is classified under CWE-798, which pertains to the use of hard-coded credentials. Specifically, versions of onion-site-template containing commit 3196bd89 include a baked-in Tor image that may contain embedded secrets copied from an existing onion domain. This hard-coded secret within the image can lead to unauthorized access if an attacker obtains the baked-in image or gains access to the user's device outside of a properly isolated containerized environment. The vulnerability does not require authentication or user interaction to exploit, and it can be triggered remotely over the network due to the nature of Tor hidden services. The flaw was addressed and fixed in commit bc9ba0fd. The CVSS 4.0 base score is 8.7, reflecting a high severity with network attack vector, low attack complexity, no privileges or user interaction required, and high impact on confidentiality due to exposure of sensitive credentials. The vulnerability does not affect integrity or availability directly but compromises confidentiality, potentially allowing attackers to impersonate or take control of the hidden service. No known exploits are currently reported in the wild, but the risk remains significant given the ease of exploitation and the critical nature of the secrets involved.

Potential Impact

For European organizations leveraging Tor hidden services for anonymity, secure communications, or hosting sensitive content, this vulnerability poses a substantial risk. Exposure of hard-coded credentials could lead to unauthorized access to hidden services, compromising confidentiality and potentially enabling attackers to impersonate legitimate services or intercept sensitive data. This could damage organizational reputation, lead to data breaches, or facilitate further attacks such as phishing or malware distribution via compromised onion sites. Given the increasing use of Tor for privacy-focused services in Europe, especially by NGOs, journalists, and privacy-conscious enterprises, the impact could be widespread. Additionally, organizations relying on containerization for security isolation may have a false sense of protection if the baked-in image is extracted and secrets are leaked. The vulnerability could also affect law enforcement or governmental agencies using onion services for covert operations, raising national security concerns.

Mitigation Recommendations

Organizations should immediately update the onion-site-template to versions including or beyond commit bc9ba0fd where the hard-coded credentials issue is fixed. It is critical to avoid using any baked-in images containing secrets copied from existing onion domains. Instead, generate unique secrets per deployment and store them securely using environment variables or dedicated secret management tools. Ensure that containerized environments are properly isolated and that images are not shared or distributed outside trusted boundaries. Conduct thorough audits of existing deployments to identify and replace any compromised images or credentials. Implement strict access controls and monitoring on devices hosting onion services to detect unauthorized access attempts. Additionally, consider employing runtime security tools that can detect anomalous behavior indicative of credential misuse or service impersonation. Regularly review and update security policies related to Tor service deployment and secret management to prevent recurrence.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-07-31T17:23:33.473Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68929ba5ad5a09ad00ec79ac

Added to database: 8/6/2025, 12:02:45 AM

Last enriched: 8/13/2025, 1:08:48 AM

Last updated: 9/15/2025, 1:13:17 PM

Views: 42

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats