Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64716: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in TecharoHQ anubis

0
Medium
VulnerabilityCVE-2025-64716cvecve-2025-64716cwe-79cwe-601
Published: Thu Nov 13 2025 (11/13/2025, 01:46:19 UTC)
Source: CVE Database V5
Vendor/Project: TecharoHQ
Product: anubis

Description

Anubis is a Web AI Firewall Utility that challenges users' connections in order to protect upstream resources from scraper bots. Prior to version 1.23.0, when using subrequest authentication, Anubis did not perform validation of the redirect URL and redirects user to any URL scheme. While most modern browsers do not allow a redirect to `javascript:` URLs, it could still trigger dangerous behavior in some cases. Anybody with a subrequest authentication may be affected. Version 1.23.0 contains a fix for the issue.

AI-Powered Analysis

AILast updated: 11/20/2025, 04:50:07 UTC

Technical Analysis

CVE-2025-64716 identifies a cross-site scripting vulnerability (CWE-79) in TecharoHQ's Anubis Web AI Firewall Utility, specifically versions before 1.23.0. Anubis functions as a protective layer against scraper bots by challenging user connections and authenticating subrequests. The vulnerability stems from Anubis's failure to validate redirect URLs during subrequest authentication, allowing redirection to arbitrary URL schemes, including potentially dangerous ones like 'javascript:'. While most modern browsers block 'javascript:' redirects to prevent script execution, some edge cases or older browsers might still process these redirects, enabling attackers to execute malicious scripts in the context of the victim's browser session. This can lead to client-side attacks such as session hijacking, phishing, or unauthorized actions performed on behalf of the user. The vulnerability does not require authentication but does require user interaction (clicking or following the redirect). The CVSS 4.0 score of 5.1 reflects a medium severity, considering network attack vector, low attack complexity, no privileges required, but user interaction needed. The scope is high because the vulnerability affects the security boundary of the web application. No known exploits are reported in the wild yet. The issue is resolved in Anubis version 1.23.0 by implementing proper validation of redirect URLs to restrict allowed schemes and prevent unsafe redirects.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the confidentiality and integrity of user sessions and data accessed through web applications protected by Anubis. Successful exploitation could allow attackers to execute arbitrary scripts in users' browsers, potentially leading to theft of session tokens, redirection to phishing sites, or unauthorized actions performed with the user's privileges. Organizations relying on Anubis for bot mitigation and web application protection may face increased risk of client-side attacks, undermining trust and potentially causing data breaches or service disruptions. The impact is heightened for sectors with sensitive data or critical infrastructure, such as finance, healthcare, and government services. Additionally, compliance with GDPR and other data protection regulations may be jeopardized if user data is compromised due to this vulnerability. Although exploitation requires user interaction, phishing or social engineering campaigns could facilitate attacks. The medium severity suggests a moderate but actionable risk that should be addressed promptly to avoid escalation or chaining with other vulnerabilities.

Mitigation Recommendations

European organizations using Anubis should immediately upgrade to version 1.23.0 or later, where the vulnerability is fixed by proper validation of redirect URLs. Until the upgrade is applied, organizations should implement strict input validation and sanitization on any user-controllable redirect parameters at the application layer to prevent unsafe URL schemes. Employ Content Security Policy (CSP) headers to restrict script execution and reduce the impact of potential XSS attacks. Monitor web traffic for unusual redirect patterns or user complaints indicative of exploitation attempts. Educate users about the risks of clicking suspicious links, especially those involving redirects. If feasible, disable subrequest authentication or restrict its usage to trusted sources only. Conduct regular security assessments and penetration testing focusing on redirect and input validation mechanisms. Finally, maintain up-to-date browser versions across the organization to leverage built-in protections against malicious redirects.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-10T14:07:42.922Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691543c7edb89fd9702216ea

Added to database: 11/13/2025, 2:34:47 AM

Last enriched: 11/20/2025, 4:50:07 AM

Last updated: 12/28/2025, 12:09:43 PM

Views: 64

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats