Skip to main content

CVE-2025-58430: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in knadh listmonk

High
VulnerabilityCVE-2025-58430cvecve-2025-58430cwe-80cwe-352cwe-79
Published: Tue Sep 09 2025 (09/09/2025, 19:37:45 UTC)
Source: CVE Database V5
Vendor/Project: knadh
Product: listmonk

Description

listmonk is a standalone, self-hosted, newsletter and mailing list manager. In versions up to and including 1.1.0, every http request in addition to the session cookie `session` there included `nonce`. The value is not checked and validated by the backend, removing `nonce` allows the requests to be processed correctly. This may seem harmless, but if chained to other vulnerabilities it can become a critical vulnerability. Cross-site request forgery and cross-site scripting chained together can result in improper admin account creation. As of time of publication, no patched versions are available.

AI-Powered Analysis

AILast updated: 09/09/2025, 19:41:10 UTC

Technical Analysis

CVE-2025-58430 is a high-severity vulnerability affecting listmonk, a standalone, self-hosted newsletter and mailing list manager, in versions up to and including 1.1.0. The vulnerability arises from improper neutralization of script-related HTML tags (CWE-80) combined with Cross-Site Request Forgery (CSRF, CWE-352) and Cross-Site Scripting (XSS, CWE-79) weaknesses. Specifically, every HTTP request to listmonk includes a session cookie named 'session' and an additional parameter 'nonce'. The backend does not validate or check the 'nonce' value, and removing it allows requests to be processed correctly. While this behavior alone may appear benign, it can be exploited when chained with other vulnerabilities. An attacker can leverage the XSS vulnerability to inject malicious scripts, which combined with CSRF, can lead to unauthorized actions such as improper creation of admin accounts. This chaining significantly elevates the threat, potentially allowing full compromise of the listmonk instance. No patched versions are available at the time of publication, increasing the urgency for mitigation. The CVSS 4.0 base score of 8.6 reflects the network attack vector, low attack complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. The vulnerability does not require authentication and can be exploited remotely, making it highly dangerous for exposed deployments of listmonk.

Potential Impact

For European organizations using listmonk for managing newsletters and mailing lists, this vulnerability poses a significant risk. Exploitation could lead to unauthorized administrative access, allowing attackers to manipulate mailing lists, send phishing or malware-laden emails to subscribers, or exfiltrate sensitive subscriber data. This could result in reputational damage, legal liabilities under GDPR due to data breaches, and operational disruptions. The ability to create admin accounts improperly could also facilitate persistent backdoors, further endangering organizational security. Since listmonk is self-hosted, organizations with internet-facing installations are particularly vulnerable. The chaining of XSS and CSRF increases the attack surface, especially if other web application security best practices are not enforced. Given the lack of an official patch, European entities must be vigilant to prevent exploitation and consider alternative solutions or compensating controls until a fix is available.

Mitigation Recommendations

1. Immediate mitigation should include restricting external access to listmonk instances by implementing network-level controls such as IP whitelisting, VPN access, or firewall rules to limit exposure. 2. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests containing malicious scripts or abnormal nonce parameter usage. 3. Disable or restrict administrative functionalities to trusted internal networks only. 4. Monitor HTTP requests for anomalous patterns, especially those manipulating the 'nonce' parameter or attempting CSRF attacks. 5. Educate administrators and users about phishing risks that could leverage this vulnerability. 6. Regularly audit and sanitize all user inputs and outputs in the application, and consider deploying Content Security Policy (CSP) headers to mitigate XSS impact. 7. Until an official patch is released, consider migrating to alternative mailing list management solutions with robust security postures. 8. Maintain up-to-date backups and incident response plans to quickly recover from potential compromises.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-09-01T20:03:06.531Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c082c41d20e9585176cde6

Added to database: 9/9/2025, 7:40:52 PM

Last enriched: 9/9/2025, 7:41:10 PM

Last updated: 9/9/2025, 7:41:15 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats