CVE-2025-59417: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in lobehub lobe-chat
Lobe Chat is an open-source artificial intelligence chat framework. Prior to version 1.129.4, there is a a cross-site scripting (XSS) vulnerability when handling chat message in lobe-chat that can be escalated to remote code execution on the user’s machine. In lobe-chat, when the response from the server is like <lobeArtifact identifier="ai-new-interpretation" ...> , it will be rendered with the lobeArtifact node, instead of the plain text. However, when the type of the lobeArtifact is image/svg+xml , it will be rendered as the SVGRender component, which internally uses dangerouslySetInnerHTML to set the content of the svg, resulting in XSS attack. Any party capable of injecting content into chat messages, such as hosting a malicious page for prompt injection, operating a compromised MCP server, or leveraging tool integrations, can exploit this vulnerability. This vulnerability is fixed in 1.129.4.
AI Analysis
Technical Summary
CVE-2025-59417 is a cross-site scripting (XSS) vulnerability identified in the open-source AI chat framework lobe-chat, specifically affecting versions prior to 1.129.4. The vulnerability arises from improper neutralization of input during web page generation (CWE-79). In lobe-chat, server responses containing <lobeArtifact> nodes are rendered differently based on their type. When the lobeArtifact type is image/svg+xml, the content is rendered using the SVGRender component, which employs React's dangerouslySetInnerHTML to inject SVG content directly into the DOM without sanitization. This unsafe rendering allows malicious SVG content to execute arbitrary JavaScript in the context of the user’s browser, leading to an XSS attack. Exploitation requires an attacker to inject malicious content into chat messages, which can be achieved by hosting a malicious page designed for prompt injection, compromising the Message Control Protocol (MCP) server, or abusing tool integrations that feed content into lobe-chat. The vulnerability can escalate from XSS to remote code execution on the user's machine, significantly increasing the risk. The flaw is fixed in version 1.129.4 of lobe-chat. The CVSS 4.0 base score is 6.8 (medium severity), reflecting network attack vector, high complexity, no privileges required, user interaction needed, and high impact on confidentiality, integrity, and availability. No known exploits are reported in the wild yet.
Potential Impact
For European organizations using lobe-chat versions prior to 1.129.4, this vulnerability poses a significant risk. Since lobe-chat is an AI chat framework, it is likely integrated into internal communication, customer support, or AI-driven workflows. Successful exploitation could lead to unauthorized script execution within users’ browsers, enabling data theft, session hijacking, or further malware delivery. The escalation to remote code execution could compromise endpoint security, leading to broader network infiltration, data breaches, or disruption of services. Given the increasing adoption of AI chat tools in European enterprises, especially in sectors like finance, healthcare, and government, the impact could be substantial. Additionally, the vulnerability’s exploitation does not require authentication but does require user interaction, making phishing or social engineering plausible attack vectors. The lack of known exploits currently provides a window for proactive mitigation, but the potential for rapid weaponization exists due to the widespread use of SVG rendering and AI chat frameworks.
Mitigation Recommendations
European organizations should immediately audit their use of lobe-chat and identify any deployments running versions earlier than 1.129.4. The primary mitigation is to upgrade to version 1.129.4 or later, where the vulnerability is patched. For environments where immediate upgrade is not feasible, organizations should implement strict input validation and sanitization on all chat message inputs, especially those capable of injecting SVG content. Disabling or restricting the rendering of SVG content within chat messages can reduce attack surface. Network-level controls such as Content Security Policy (CSP) headers should be enforced to restrict script execution and mitigate XSS impact. Monitoring and logging chat message content for anomalous or suspicious SVG payloads can aid in early detection. Additionally, organizations should review and secure any MCP servers and tool integrations feeding content into lobe-chat to prevent unauthorized content injection. User awareness training to recognize suspicious chat content and avoid interaction with untrusted messages will further reduce risk.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Belgium, Italy, Spain
CVE-2025-59417: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in lobehub lobe-chat
Description
Lobe Chat is an open-source artificial intelligence chat framework. Prior to version 1.129.4, there is a a cross-site scripting (XSS) vulnerability when handling chat message in lobe-chat that can be escalated to remote code execution on the user’s machine. In lobe-chat, when the response from the server is like <lobeArtifact identifier="ai-new-interpretation" ...> , it will be rendered with the lobeArtifact node, instead of the plain text. However, when the type of the lobeArtifact is image/svg+xml , it will be rendered as the SVGRender component, which internally uses dangerouslySetInnerHTML to set the content of the svg, resulting in XSS attack. Any party capable of injecting content into chat messages, such as hosting a malicious page for prompt injection, operating a compromised MCP server, or leveraging tool integrations, can exploit this vulnerability. This vulnerability is fixed in 1.129.4.
AI-Powered Analysis
Technical Analysis
CVE-2025-59417 is a cross-site scripting (XSS) vulnerability identified in the open-source AI chat framework lobe-chat, specifically affecting versions prior to 1.129.4. The vulnerability arises from improper neutralization of input during web page generation (CWE-79). In lobe-chat, server responses containing <lobeArtifact> nodes are rendered differently based on their type. When the lobeArtifact type is image/svg+xml, the content is rendered using the SVGRender component, which employs React's dangerouslySetInnerHTML to inject SVG content directly into the DOM without sanitization. This unsafe rendering allows malicious SVG content to execute arbitrary JavaScript in the context of the user’s browser, leading to an XSS attack. Exploitation requires an attacker to inject malicious content into chat messages, which can be achieved by hosting a malicious page designed for prompt injection, compromising the Message Control Protocol (MCP) server, or abusing tool integrations that feed content into lobe-chat. The vulnerability can escalate from XSS to remote code execution on the user's machine, significantly increasing the risk. The flaw is fixed in version 1.129.4 of lobe-chat. The CVSS 4.0 base score is 6.8 (medium severity), reflecting network attack vector, high complexity, no privileges required, user interaction needed, and high impact on confidentiality, integrity, and availability. No known exploits are reported in the wild yet.
Potential Impact
For European organizations using lobe-chat versions prior to 1.129.4, this vulnerability poses a significant risk. Since lobe-chat is an AI chat framework, it is likely integrated into internal communication, customer support, or AI-driven workflows. Successful exploitation could lead to unauthorized script execution within users’ browsers, enabling data theft, session hijacking, or further malware delivery. The escalation to remote code execution could compromise endpoint security, leading to broader network infiltration, data breaches, or disruption of services. Given the increasing adoption of AI chat tools in European enterprises, especially in sectors like finance, healthcare, and government, the impact could be substantial. Additionally, the vulnerability’s exploitation does not require authentication but does require user interaction, making phishing or social engineering plausible attack vectors. The lack of known exploits currently provides a window for proactive mitigation, but the potential for rapid weaponization exists due to the widespread use of SVG rendering and AI chat frameworks.
Mitigation Recommendations
European organizations should immediately audit their use of lobe-chat and identify any deployments running versions earlier than 1.129.4. The primary mitigation is to upgrade to version 1.129.4 or later, where the vulnerability is patched. For environments where immediate upgrade is not feasible, organizations should implement strict input validation and sanitization on all chat message inputs, especially those capable of injecting SVG content. Disabling or restricting the rendering of SVG content within chat messages can reduce attack surface. Network-level controls such as Content Security Policy (CSP) headers should be enforced to restrict script execution and mitigate XSS impact. Monitoring and logging chat message content for anomalous or suspicious SVG payloads can aid in early detection. Additionally, organizations should review and secure any MCP servers and tool integrations feeding content into lobe-chat to prevent unauthorized content injection. User awareness training to recognize suspicious chat content and avoid interaction with untrusted messages will further reduce risk.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-09-15T19:13:16.904Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68cc1a808818f871806daf43
Added to database: 9/18/2025, 2:43:12 PM
Last enriched: 9/18/2025, 2:43:28 PM
Last updated: 9/19/2025, 6:47:39 AM
Views: 12
Related Threats
CVE-2025-9969: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Vizly Web Design Real Estate Packages
HighCVE-2025-10468: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Beyaz Computer CityPlus
HighCVE-2025-10719: CWE-639 Authorization Bypass Through User-Controlled Key in WisdomGarden Tronclass
MediumCVE-2025-8531: CWE-130 Improper Handling of Length Parameter Inconsistency in Mitsubishi Electric Corporation MELSEC-Q Series Q03UDVCPU
MediumWatchGuard Issues Fix for 9.3-Rated Firebox Firewall Vulnerability
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.