プラットフォーム
javascript
コンポーネント
promptcraft-forge-studio
修正版
0.0.1
CVE-2025-58361 describes a critical Cross-Site Scripting (XSS) vulnerability discovered in Promptcraft Forge Studio, a toolkit for LLM application development. This flaw allows attackers to inject and execute malicious scripts by exploiting insufficient URL scheme validation. All versions from 0.0.0 and above are affected, and a fix is available in version 0.0.1.
The vulnerability stems from inadequate sanitization of URLs within Promptcraft Forge Studio's validation process. Specifically, the application fails to properly filter data: URLs, allowing attackers to embed malicious JavaScript code within image or other data URI schemes. When these URLs are processed and displayed, the embedded script executes in the user's browser, potentially leading to session hijacking, data theft, or defacement of the application. Given the tool's purpose in managing LLM applications, a successful exploit could compromise sensitive prompts, training data, or even the underlying LLM models themselves, significantly expanding the attack surface.
This vulnerability was publicly disclosed on 2025-09-04. No public proof-of-concept (PoC) code has been released at the time of writing, but the ease of crafting malicious data: URLs suggests a high probability of exploitation. The vulnerability's criticality (CVSS 9.3) and the potential impact on LLM application workflows warrant immediate attention. It is not currently listed on CISA KEV.
Developers and organizations utilizing Promptcraft Forge Studio for building and managing LLM-powered applications are at significant risk. This includes teams working with sensitive data, deploying applications in production environments, or relying on the tool for critical workflows. Shared hosting environments where multiple users share the same instance of Promptcraft Forge Studio are particularly vulnerable.
• javascript / web: Inspect network traffic for requests containing data: URLs, particularly in href or src attributes.
// Example: Check for data: URLs in a webpage
const links = document.querySelectorAll('a');
links.forEach(link => {
if (link.href.startsWith('data:')) {
console.warn('Potential XSS vulnerability: ', link.href);
}
});• generic web: Monitor access logs for unusual patterns involving URLs with embedded scripts or data URIs.
grep 'data:image/svg+xml' access.logdisclosure
エクスプロイト状況
EPSS
0.04% (12% パーセンタイル)
CISA SSVC
CVSS ベクトル
The primary mitigation for CVE-2025-58361 is to immediately upgrade Promptcraft Forge Studio to version 0.0.1, which includes the necessary URL validation fixes. If upgrading is not immediately feasible, consider implementing a Web Application Firewall (WAF) rule to block requests containing data: URLs or other suspicious URL schemes. Additionally, carefully review any user-supplied URLs before incorporating them into the application to ensure they are safe and properly sanitized. Thorough input validation on all user-provided data is crucial to prevent similar vulnerabilities in the future.
現在、解決策は利用できません。脆弱性が修正されたアップデートがリリースされるまで、href/src属性でユーザーが制御するURLの使用を避けることを推奨します。GitHubリポジトリを監視して、アップデートや考えられる回避策を確認してください。
脆弱性分析と重要アラートをメールでお届けします。
CVE-2025-58361 is a critical XSS vulnerability in Promptcraft Forge Studio allowing attackers to execute scripts via malicious data:image/svg+xml URLs.
Yes, if you are using Promptcraft Forge Studio versions 0.0.0 and above, you are affected by this vulnerability.
Upgrade to version 0.0.1 of Promptcraft Forge Studio to resolve the vulnerability. Consider WAF rules as a temporary workaround.
While no public exploits are currently known, the ease of exploitation suggests a high probability of active campaigns.
Refer to the official Promptcraft Forge Studio documentation and release notes for the advisory regarding CVE-2025-58361.
依存関係ファイルをアップロードすれば、このCVEや他のCVEがあなたに影響するか即座にわかります。