FKIE_CVE-2025-49126
Vulnerability from fkie_nvd - Published: 2025-06-23 18:15 - Updated: 2025-06-23 20:16
Severity ?
Summary
Visionatrix is an AI Media processing tool using ComfyUI. In versions 1.5.0 to before 2.5.1, the /docs/flows endpoint is vulnerable to a Reflected XSS (Cross-Site Scripting) attack allowing full takeover of the application and exfiltration of secrets stored in the application. The implementation uses the get_swagger_ui_html function from FastAPI. This function does not encode or sanitize its arguments before using them to generate the HTML for the swagger documentation page and is not intended to be used with user-controlled arguments. Any user of this application can be targeted with a one-click attack that can takeover their session and all the secrets that may be contained within it. This issue has been patched in version 2.5.1.
References
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Visionatrix is an AI Media processing tool using ComfyUI. In versions 1.5.0 to before 2.5.1, the /docs/flows endpoint is vulnerable to a Reflected XSS (Cross-Site Scripting) attack allowing full takeover of the application and exfiltration of secrets stored in the application. The implementation uses the get_swagger_ui_html function from FastAPI. This function does not encode or sanitize its arguments before using them to generate the HTML for the swagger documentation page and is not intended to be used with user-controlled arguments. Any user of this application can be targeted with a one-click attack that can takeover their session and all the secrets that may be contained within it. This issue has been patched in version 2.5.1."
},
{
"lang": "es",
"value": "Visionatrix es una herramienta de procesamiento de medios de IA que utiliza ComfyUI. En las versiones 1.5.0 y anteriores a la 2.5.1, el endpoint /docs/flows es vulnerable a un ataque XSS reflejado (Cross-Site Scripting), que permite el control total de la aplicaci\u00f3n y la exfiltraci\u00f3n de los secretos almacenados en ella. La implementaci\u00f3n utiliza la funci\u00f3n get_swagger_ui_html de FastAPI. Esta funci\u00f3n no codifica ni depura sus argumentos antes de usarlos para generar el HTML de la p\u00e1gina de documentaci\u00f3n de Swagger y no est\u00e1 dise\u00f1ada para usarse con argumentos controlados por el usuario. Cualquier usuario de esta aplicaci\u00f3n puede ser objeto de un ataque de un solo clic que puede controlar su sesi\u00f3n y todos los secretos que contenga. Este problema se ha corregido en la versi\u00f3n 2.5.1."
}
],
"id": "CVE-2025-49126",
"lastModified": "2025-06-23T20:16:21.633",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.3,
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
},
"published": "2025-06-23T18:15:21.517",
"references": [
{
"source": "security-advisories@github.com",
"url": "https://github.com/Visionatrix/Visionatrix/commit/63aafe6e4d1bffe4bf69e73b6fdfc65c71a8f5b8"
},
{
"source": "security-advisories@github.com",
"url": "https://github.com/Visionatrix/Visionatrix/security/advisories/GHSA-w36r-9jvx-q48v"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…