CVE-2025-58430: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in knadh listmonk
listmonk is a standalone, self-hosted, newsletter and mailing list manager. In versions up to and including 1.1.0, every http request in addition to the session cookie `session` there included `nonce`. The value is not checked and validated by the backend, removing `nonce` allows the requests to be processed correctly. This may seem harmless, but if chained to other vulnerabilities it can become a critical vulnerability. Cross-site request forgery and cross-site scripting chained together can result in improper admin account creation. As of time of publication, no patched versions are available.
AI Analysis
Technical Summary
CVE-2025-58430 is a high-severity vulnerability affecting listmonk, a standalone, self-hosted newsletter and mailing list manager, in versions up to and including 1.1.0. The vulnerability arises from improper neutralization of script-related HTML tags (CWE-80) combined with Cross-Site Request Forgery (CSRF, CWE-352) and Cross-Site Scripting (XSS, CWE-79) weaknesses. Specifically, every HTTP request to listmonk includes a session cookie named 'session' and an additional parameter 'nonce'. The backend does not validate or check the 'nonce' value, and removing it allows requests to be processed correctly. While this behavior alone may appear benign, it can be exploited when chained with other vulnerabilities. An attacker can leverage the XSS vulnerability to inject malicious scripts, which combined with CSRF, can lead to unauthorized actions such as improper creation of admin accounts. This chaining significantly elevates the threat, potentially allowing full compromise of the listmonk instance. No patched versions are available at the time of publication, increasing the urgency for mitigation. The CVSS 4.0 base score of 8.6 reflects the network attack vector, low attack complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. The vulnerability does not require authentication and can be exploited remotely, making it highly dangerous for exposed deployments of listmonk.
Potential Impact
For European organizations using listmonk for managing newsletters and mailing lists, this vulnerability poses a significant risk. Exploitation could lead to unauthorized administrative access, allowing attackers to manipulate mailing lists, send phishing or malware-laden emails to subscribers, or exfiltrate sensitive subscriber data. This could result in reputational damage, legal liabilities under GDPR due to data breaches, and operational disruptions. The ability to create admin accounts improperly could also facilitate persistent backdoors, further endangering organizational security. Since listmonk is self-hosted, organizations with internet-facing installations are particularly vulnerable. The chaining of XSS and CSRF increases the attack surface, especially if other web application security best practices are not enforced. Given the lack of an official patch, European entities must be vigilant to prevent exploitation and consider alternative solutions or compensating controls until a fix is available.
Mitigation Recommendations
1. Immediate mitigation should include restricting external access to listmonk instances by implementing network-level controls such as IP whitelisting, VPN access, or firewall rules to limit exposure. 2. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests containing malicious scripts or abnormal nonce parameter usage. 3. Disable or restrict administrative functionalities to trusted internal networks only. 4. Monitor HTTP requests for anomalous patterns, especially those manipulating the 'nonce' parameter or attempting CSRF attacks. 5. Educate administrators and users about phishing risks that could leverage this vulnerability. 6. Regularly audit and sanitize all user inputs and outputs in the application, and consider deploying Content Security Policy (CSP) headers to mitigate XSS impact. 7. Until an official patch is released, consider migrating to alternative mailing list management solutions with robust security postures. 8. Maintain up-to-date backups and incident response plans to quickly recover from potential compromises.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy, Spain
CVE-2025-58430: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in knadh listmonk
Description
listmonk is a standalone, self-hosted, newsletter and mailing list manager. In versions up to and including 1.1.0, every http request in addition to the session cookie `session` there included `nonce`. The value is not checked and validated by the backend, removing `nonce` allows the requests to be processed correctly. This may seem harmless, but if chained to other vulnerabilities it can become a critical vulnerability. Cross-site request forgery and cross-site scripting chained together can result in improper admin account creation. As of time of publication, no patched versions are available.
AI-Powered Analysis
Technical Analysis
CVE-2025-58430 is a high-severity vulnerability affecting listmonk, a standalone, self-hosted newsletter and mailing list manager, in versions up to and including 1.1.0. The vulnerability arises from improper neutralization of script-related HTML tags (CWE-80) combined with Cross-Site Request Forgery (CSRF, CWE-352) and Cross-Site Scripting (XSS, CWE-79) weaknesses. Specifically, every HTTP request to listmonk includes a session cookie named 'session' and an additional parameter 'nonce'. The backend does not validate or check the 'nonce' value, and removing it allows requests to be processed correctly. While this behavior alone may appear benign, it can be exploited when chained with other vulnerabilities. An attacker can leverage the XSS vulnerability to inject malicious scripts, which combined with CSRF, can lead to unauthorized actions such as improper creation of admin accounts. This chaining significantly elevates the threat, potentially allowing full compromise of the listmonk instance. No patched versions are available at the time of publication, increasing the urgency for mitigation. The CVSS 4.0 base score of 8.6 reflects the network attack vector, low attack complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. The vulnerability does not require authentication and can be exploited remotely, making it highly dangerous for exposed deployments of listmonk.
Potential Impact
For European organizations using listmonk for managing newsletters and mailing lists, this vulnerability poses a significant risk. Exploitation could lead to unauthorized administrative access, allowing attackers to manipulate mailing lists, send phishing or malware-laden emails to subscribers, or exfiltrate sensitive subscriber data. This could result in reputational damage, legal liabilities under GDPR due to data breaches, and operational disruptions. The ability to create admin accounts improperly could also facilitate persistent backdoors, further endangering organizational security. Since listmonk is self-hosted, organizations with internet-facing installations are particularly vulnerable. The chaining of XSS and CSRF increases the attack surface, especially if other web application security best practices are not enforced. Given the lack of an official patch, European entities must be vigilant to prevent exploitation and consider alternative solutions or compensating controls until a fix is available.
Mitigation Recommendations
1. Immediate mitigation should include restricting external access to listmonk instances by implementing network-level controls such as IP whitelisting, VPN access, or firewall rules to limit exposure. 2. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests containing malicious scripts or abnormal nonce parameter usage. 3. Disable or restrict administrative functionalities to trusted internal networks only. 4. Monitor HTTP requests for anomalous patterns, especially those manipulating the 'nonce' parameter or attempting CSRF attacks. 5. Educate administrators and users about phishing risks that could leverage this vulnerability. 6. Regularly audit and sanitize all user inputs and outputs in the application, and consider deploying Content Security Policy (CSP) headers to mitigate XSS impact. 7. Until an official patch is released, consider migrating to alternative mailing list management solutions with robust security postures. 8. Maintain up-to-date backups and incident response plans to quickly recover from potential compromises.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-09-01T20:03:06.531Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c082c41d20e9585176cde6
Added to database: 9/9/2025, 7:40:52 PM
Last enriched: 9/9/2025, 7:41:10 PM
Last updated: 9/9/2025, 7:41:15 PM
Views: 2
Related Threats
CVE-2025-54084: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Calix GigaCenter ONT
HighCVE-2025-53913: CWE-269 Improper Privilege Management in Calix GigaCenter ONT
HighCVE-2025-59037: CWE-506: Embedded Malicious Code in duckdb duckdb-node
HighCVE-2025-54083: CWE-922 Insecure Storage of Sensitive Information in Calix GigaCenter ONT
MediumCVE-2025-44595: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.