Promptcraft Forge Studio's onvolledige URL-controle is kwetsbaar voor XSS via SVG
Platform
javascript
Component
promptcraft-forge-studio
Opgelost in
0.0.1
CVE-2025-58361 describes a critical Cross-Site Scripting (XSS) vulnerability discovered in Promptcraft Forge Studio, a toolkit for LLM application development. This flaw allows attackers to inject and execute malicious scripts by exploiting insufficient URL scheme validation. All versions from 0.0.0 and above are affected, and a fix is available in version 0.0.1.
Impact en Aanvalsscenarioswordt vertaald…
The vulnerability stems from inadequate sanitization of URLs within Promptcraft Forge Studio's validation process. Specifically, the application fails to properly filter data: URLs, allowing attackers to embed malicious JavaScript code within image or other data URI schemes. When these URLs are processed and displayed, the embedded script executes in the user's browser, potentially leading to session hijacking, data theft, or defacement of the application. Given the tool's purpose in managing LLM applications, a successful exploit could compromise sensitive prompts, training data, or even the underlying LLM models themselves, significantly expanding the attack surface.
Uitbuitingscontextwordt vertaald…
This vulnerability was publicly disclosed on 2025-09-04. No public proof-of-concept (PoC) code has been released at the time of writing, but the ease of crafting malicious data: URLs suggests a high probability of exploitation. The vulnerability's criticality (CVSS 9.3) and the potential impact on LLM application workflows warrant immediate attention. It is not currently listed on CISA KEV.
Wie Loopt Risicowordt vertaald…
Developers and organizations utilizing Promptcraft Forge Studio for building and managing LLM-powered applications are at significant risk. This includes teams working with sensitive data, deploying applications in production environments, or relying on the tool for critical workflows. Shared hosting environments where multiple users share the same instance of Promptcraft Forge Studio are particularly vulnerable.
Detectiestappenwordt vertaald…
• javascript / web: Inspect network traffic for requests containing data: URLs, particularly in href or src attributes.
// Example: Check for data: URLs in a webpage
const links = document.querySelectorAll('a');
links.forEach(link => {
if (link.href.startsWith('data:')) {
console.warn('Potential XSS vulnerability: ', link.href);
}
});• generic web: Monitor access logs for unusual patterns involving URLs with embedded scripts or data URIs.
grep 'data:image/svg+xml' access.logAanvalstijdlijn
- Disclosure
disclosure
Dreigingsinformatie
Exploit Status
EPSS
0.04% (12% percentiel)
CISA SSVC
CVSS-vector
Wat betekenen deze metrics?
- Attack Vector
- Netwerk — op afstand uitbuitbaar via internet. Geen fysieke of lokale toegang vereist.
- Attack Complexity
- Laag — geen speciale voorwaarden vereist. Betrouwbaar uitbuitbaar.
- Privileges Required
- Geen — geen authenticatie vereist om te exploiteren.
- User Interaction
- Vereist — slachtoffer moet een bestand openen, op een link klikken of een pagina bezoeken.
- Scope
- Gewijzigd — aanval kan voorbij het kwetsbare component uitbreiden naar andere systemen.
- Confidentiality
- Hoog — volledig verlies van vertrouwelijkheid. Aanvaller kan alle gegevens lezen.
- Integrity
- Hoog — aanvaller kan alle gegevens schrijven, aanpassen of verwijderen.
- Availability
- Geen — geen beschikbaarheidsimpact.
Getroffen Software
Zwakheidsclassificatie (CWE)
Tijdlijn
- Gereserveerd
- Gepubliceerd
- EPSS bijgewerkt
Mitigatie en Workaroundswordt vertaald…
The primary mitigation for CVE-2025-58361 is to immediately upgrade Promptcraft Forge Studio to version 0.0.1, which includes the necessary URL validation fixes. If upgrading is not immediately feasible, consider implementing a Web Application Firewall (WAF) rule to block requests containing data: URLs or other suspicious URL schemes. Additionally, carefully review any user-supplied URLs before incorporating them into the application to ensure they are safe and properly sanitized. Thorough input validation on all user-provided data is crucial to prevent similar vulnerabilities in the future.
Hoe te verhelpen
Er is momenteel geen oplossing beschikbaar. Het wordt aanbevolen om het gebruik van gebruikersgestuurde URL's in de href/src-attributen te vermijden totdat een update wordt uitgebracht die de kwetsbaarheid verhelpt. Houd het GitHub-repository in de gaten voor updates en mogelijke workarounds.
CVE Beveiligingsnieuwsbrief
Kwetsbaarheidsanalyses en kritieke waarschuwingen direct in uw inbox.
Veelgestelde vragenwordt vertaald…
What is CVE-2025-58361 — XSS in Promptcraft Forge Studio?
CVE-2025-58361 is a critical XSS vulnerability in Promptcraft Forge Studio allowing attackers to execute scripts via malicious data:image/svg+xml URLs.
Am I affected by CVE-2025-58361 in Promptcraft Forge Studio?
Yes, if you are using Promptcraft Forge Studio versions 0.0.0 and above, you are affected by this vulnerability.
How do I fix CVE-2025-58361 in Promptcraft Forge Studio?
Upgrade to version 0.0.1 of Promptcraft Forge Studio to resolve the vulnerability. Consider WAF rules as a temporary workaround.
Is CVE-2025-58361 being actively exploited?
While no public exploits are currently known, the ease of exploitation suggests a high probability of active campaigns.
Where can I find the official Promptcraft Forge Studio advisory for CVE-2025-58361?
Refer to the official Promptcraft Forge Studio documentation and release notes for the advisory regarding CVE-2025-58361.
Is jouw project getroffen?
Upload je dependency-bestand en kom direct te weten of deze en andere CVEs jou raken.