平台
javascript
组件
promptcraft-forge-studio
修复版本
0.0.1
CVE-2025-58361 describes a critical Cross-Site Scripting (XSS) vulnerability discovered in Promptcraft Forge Studio, a toolkit for LLM application development. This flaw allows attackers to inject and execute malicious scripts by exploiting insufficient URL scheme validation. All versions from 0.0.0 and above are affected, and a fix is available in version 0.0.1.
The vulnerability stems from inadequate sanitization of URLs within Promptcraft Forge Studio's validation process. Specifically, the application fails to properly filter data: URLs, allowing attackers to embed malicious JavaScript code within image or other data URI schemes. When these URLs are processed and displayed, the embedded script executes in the user's browser, potentially leading to session hijacking, data theft, or defacement of the application. Given the tool's purpose in managing LLM applications, a successful exploit could compromise sensitive prompts, training data, or even the underlying LLM models themselves, significantly expanding the attack surface.
This vulnerability was publicly disclosed on 2025-09-04. No public proof-of-concept (PoC) code has been released at the time of writing, but the ease of crafting malicious data: URLs suggests a high probability of exploitation. The vulnerability's criticality (CVSS 9.3) and the potential impact on LLM application workflows warrant immediate attention. It is not currently listed on CISA KEV.
Developers and organizations utilizing Promptcraft Forge Studio for building and managing LLM-powered applications are at significant risk. This includes teams working with sensitive data, deploying applications in production environments, or relying on the tool for critical workflows. Shared hosting environments where multiple users share the same instance of Promptcraft Forge Studio are particularly vulnerable.
• javascript / web: Inspect network traffic for requests containing data: URLs, particularly in href or src attributes.
// Example: Check for data: URLs in a webpage
const links = document.querySelectorAll('a');
links.forEach(link => {
if (link.href.startsWith('data:')) {
console.warn('Potential XSS vulnerability: ', link.href);
}
});• generic web: Monitor access logs for unusual patterns involving URLs with embedded scripts or data URIs.
grep 'data:image/svg+xml' access.logdisclosure
漏洞利用状态
EPSS
0.04% (12% 百分位)
CISA SSVC
CVSS 向量
The primary mitigation for CVE-2025-58361 is to immediately upgrade Promptcraft Forge Studio to version 0.0.1, which includes the necessary URL validation fixes. If upgrading is not immediately feasible, consider implementing a Web Application Firewall (WAF) rule to block requests containing data: URLs or other suspicious URL schemes. Additionally, carefully review any user-supplied URLs before incorporating them into the application to ensure they are safe and properly sanitized. Thorough input validation on all user-provided data is crucial to prevent similar vulnerabilities in the future.
目前没有可用的解决方案。建议在发布修复此漏洞的更新之前,避免在 href/src 属性中使用用户控制的 URL。请监控 GitHub 仓库以获取更新和可能的替代方案。
漏洞分析和关键警报直接发送到您的邮箱。
CVE-2025-58361 is a critical XSS vulnerability in Promptcraft Forge Studio allowing attackers to execute scripts via malicious data:image/svg+xml URLs.
Yes, if you are using Promptcraft Forge Studio versions 0.0.0 and above, you are affected by this vulnerability.
Upgrade to version 0.0.1 of Promptcraft Forge Studio to resolve the vulnerability. Consider WAF rules as a temporary workaround.
While no public exploits are currently known, the ease of exploitation suggests a high probability of active campaigns.
Refer to the official Promptcraft Forge Studio documentation and release notes for the advisory regarding CVE-2025-58361.
上传你的依赖文件,立即了解此CVE和其他CVE是否影响你。