CVE-2025-27500

OpenZiti is a free and open source project focused on bringing zero trust to any application. An endpoint(/api/upload) on the admin panel can be accessed without any form of authentication. This endpoint accepts an HTTP POST to upload a file which is then stored on the node and is available via URL. This can lead to a stored cross site scripting attack if the file uploaded contains malicious code and is then accessed and executed within the context of the user's browser. This function is no longer necessary as the ziti-console moves from a node server application to a single page application, and has been disabled. The vulnerability is fixed in 3.7.1.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openziti:openziti:*:*:*:*:*:*:*:*

History

05 Mar 2025, 20:16

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1
References () https://github.com/openziti/ziti-console/security/advisories/GHSA-frxm-vm48-5qf2 - () https://github.com/openziti/ziti-console/security/advisories/GHSA-frxm-vm48-5qf2 - Third Party Advisory
First Time Openziti
Openziti openziti
CPE cpe:2.3:a:openziti:openziti:*:*:*:*:*:*:*:*

03 Mar 2025, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-03 19:15

Updated : 2025-03-05 20:16


NVD link : CVE-2025-27500

Mitre link : CVE-2025-27500


JSON object : View

Products Affected

openziti

  • openziti
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')