Skip to main content

CVE-2025-54872: CWE-798: Use of Hard-coded Credentials in Vessel9817 onion-site-template

High
VulnerabilityCVE-2025-54872cvecve-2025-54872cwe-798
Published: Tue Aug 05 2025 (08/05/2025, 23:40:46 UTC)
Source: CVE Database V5
Vendor/Project: Vessel9817
Product: onion-site-template

Description

onion-site-template is a complete, scalable tor hidden service self-hosting sample. Versions which include commit 3196bd89 contain a baked-in tor image if the secrets were copied from an existing onion domain. A website could be compromised if a user shared the baked-in image, or if someone were able to acquire access to the user's device outside of a containerized environment. This is fixed by commit bc9ba0fd.

AI-Powered Analysis

AILast updated: 08/06/2025, 00:17:52 UTC

Technical Analysis

CVE-2025-54872 is a high-severity vulnerability classified under CWE-798, which pertains to the use of hard-coded credentials. This vulnerability affects the Vessel9817 project's onion-site-template, a scalable Tor hidden service self-hosting sample. The issue exists in versions containing commit 3196bd89 up to but not including commit bc9ba0fd. Specifically, these versions include a baked-in Tor image that may contain hard-coded secrets copied from an existing onion domain. This baked-in image can inadvertently expose sensitive credentials if shared publicly or if an attacker gains access to the user's device outside of a properly isolated containerized environment. The vulnerability allows an attacker to potentially compromise the hidden service website by leveraging these embedded secrets without requiring any authentication or user interaction. The CVSS 4.0 base score of 8.7 reflects the ease of exploitation (network vector, low attack complexity, no privileges or user interaction required) and the high impact on confidentiality (complete compromise of secrets), though integrity and availability impacts are not indicated. The vulnerability was addressed in commit bc9ba0fd, which presumably removes or secures the hard-coded credentials. No known exploits are reported in the wild as of the publication date.

Potential Impact

For European organizations utilizing the onion-site-template for hosting Tor hidden services, this vulnerability poses a significant risk. The exposure of hard-coded credentials can lead to unauthorized access and full compromise of the hidden service, potentially resulting in data leakage, defacement, or service disruption. Given the nature of Tor hidden services, which are often used for privacy-sensitive or censorship-resistant applications, exploitation could undermine user anonymity and trust. European entities involved in secure communications, whistleblowing platforms, or privacy-focused services could face reputational damage and legal consequences under regulations such as GDPR if sensitive data is exposed. Additionally, the compromise of these services could be leveraged by threat actors for further attacks or surveillance. The lack of required authentication and user interaction lowers the barrier for attackers, increasing the likelihood of exploitation if vulnerable versions are deployed.

Mitigation Recommendations

European organizations should immediately audit their deployments of the onion-site-template to identify affected versions containing commit 3196bd89 through bc9ba0fd. They must upgrade to the fixed version that removes the hard-coded credentials. If upgrading is not immediately feasible, organizations should ensure that the environment running the service is fully containerized and isolated, with strict access controls to prevent unauthorized device access. Additionally, any baked-in images or configuration files containing secrets should be regenerated with unique, non-hardcoded credentials. Organizations should implement secure secret management practices, such as environment variables or dedicated secret stores, avoiding embedding secrets in code or images. Regular security reviews and scans for hard-coded credentials in codebases and container images should be instituted. Monitoring for unusual access patterns to the Tor hidden service and network traffic analysis can help detect potential exploitation attempts. Finally, organizations should educate developers and administrators on the risks of hard-coded credentials and enforce secure coding standards.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-07-31T17:23:33.473Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68929ba5ad5a09ad00ec79ac

Added to database: 8/6/2025, 12:02:45 AM

Last enriched: 8/6/2025, 12:17:52 AM

Last updated: 8/6/2025, 12:34:10 AM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats