Promptcraft Forge Studio's incomplete URL check is vulnerable to XSS via SVG
Plateforme
javascript
Composant
promptcraft-forge-studio
Corrigé dans
0.0.1
CVE-2025-58361 describes a critical Cross-Site Scripting (XSS) vulnerability discovered in Promptcraft Forge Studio, a toolkit for LLM application development. This flaw allows attackers to inject and execute malicious scripts by exploiting insufficient URL scheme validation. All versions from 0.0.0 and above are affected, and a fix is available in version 0.0.1.
Impact et Scénarios d'Attaquetraduction en cours…
The vulnerability stems from inadequate sanitization of URLs within Promptcraft Forge Studio's validation process. Specifically, the application fails to properly filter data: URLs, allowing attackers to embed malicious JavaScript code within image or other data URI schemes. When these URLs are processed and displayed, the embedded script executes in the user's browser, potentially leading to session hijacking, data theft, or defacement of the application. Given the tool's purpose in managing LLM applications, a successful exploit could compromise sensitive prompts, training data, or even the underlying LLM models themselves, significantly expanding the attack surface.
Contexte d'Exploitationtraduction en cours…
This vulnerability was publicly disclosed on 2025-09-04. No public proof-of-concept (PoC) code has been released at the time of writing, but the ease of crafting malicious data: URLs suggests a high probability of exploitation. The vulnerability's criticality (CVSS 9.3) and the potential impact on LLM application workflows warrant immediate attention. It is not currently listed on CISA KEV.
Qui Est à Risquetraduction en cours…
Developers and organizations utilizing Promptcraft Forge Studio for building and managing LLM-powered applications are at significant risk. This includes teams working with sensitive data, deploying applications in production environments, or relying on the tool for critical workflows. Shared hosting environments where multiple users share the same instance of Promptcraft Forge Studio are particularly vulnerable.
Étapes de Détectiontraduction en cours…
• javascript / web: Inspect network traffic for requests containing data: URLs, particularly in href or src attributes.
// Example: Check for data: URLs in a webpage
const links = document.querySelectorAll('a');
links.forEach(link => {
if (link.href.startsWith('data:')) {
console.warn('Potential XSS vulnerability: ', link.href);
}
});• generic web: Monitor access logs for unusual patterns involving URLs with embedded scripts or data URIs.
grep 'data:image/svg+xml' access.logChronologie de l'Attaque
- Disclosure
disclosure
Renseignement sur les Menaces
Statut de l'Exploit
EPSS
0.04% (percentile 12%)
CISA SSVC
Vecteur CVSS
Que signifient ces métriques?
- Attack Vector
- Réseau — exploitable à distance via internet. Aucun accès physique ou local requis.
- Attack Complexity
- Faible — aucune condition spéciale requise. Exploitable de manière fiable.
- Privileges Required
- Aucun — sans authentification. Aucune identifiant requis pour exploiter.
- User Interaction
- Requise — la victime doit ouvrir un fichier, cliquer sur un lien ou visiter une page.
- Scope
- Modifié — l'attaque peut pivoter au-delà du composant vulnérable.
- Confidentiality
- Élevé — perte totale de confidentialité. L'attaquant peut lire toutes les données.
- Integrity
- Élevé — l'attaquant peut écrire, modifier ou supprimer toutes les données.
- Availability
- Aucun — aucun impact sur la disponibilité.
Logiciel Affecté
Classification de Faiblesse (CWE)
Chronologie
- Réservé
- Publiée
- EPSS mis à jour
Mitigation et Contournementstraduction en cours…
The primary mitigation for CVE-2025-58361 is to immediately upgrade Promptcraft Forge Studio to version 0.0.1, which includes the necessary URL validation fixes. If upgrading is not immediately feasible, consider implementing a Web Application Firewall (WAF) rule to block requests containing data: URLs or other suspicious URL schemes. Additionally, carefully review any user-supplied URLs before incorporating them into the application to ensure they are safe and properly sanitized. Thorough input validation on all user-provided data is crucial to prevent similar vulnerabilities in the future.
Comment corriger
Actuellement, aucune solution n'est disponible. Il est recommandé d'éviter l'utilisation d'URLs contrôlées par l'utilisateur dans les attributs href/src jusqu'à ce qu'une mise à jour corrigeant la vulnérabilité soit publiée. Surveillez le dépôt GitHub pour obtenir des mises à jour et d'éventuelles solutions de contournement.
Newsletter Sécurité CVE
Analyses de vulnérabilités et alertes critiques directement dans votre boîte mail.
Questions fréquentestraduction en cours…
What is CVE-2025-58361 — XSS in Promptcraft Forge Studio?
CVE-2025-58361 is a critical XSS vulnerability in Promptcraft Forge Studio allowing attackers to execute scripts via malicious data:image/svg+xml URLs.
Am I affected by CVE-2025-58361 in Promptcraft Forge Studio?
Yes, if you are using Promptcraft Forge Studio versions 0.0.0 and above, you are affected by this vulnerability.
How do I fix CVE-2025-58361 in Promptcraft Forge Studio?
Upgrade to version 0.0.1 of Promptcraft Forge Studio to resolve the vulnerability. Consider WAF rules as a temporary workaround.
Is CVE-2025-58361 being actively exploited?
While no public exploits are currently known, the ease of exploitation suggests a high probability of active campaigns.
Where can I find the official Promptcraft Forge Studio advisory for CVE-2025-58361?
Refer to the official Promptcraft Forge Studio documentation and release notes for the advisory regarding CVE-2025-58361.
Ton projet est-il affecté ?
Téléverse ton fichier de dépendances et découvre instantanément si cette CVE et d'autres te touchent.