Miniflux Media Proxy vulnerable to Stored Cross-site Scripting due to improper Content-Security-Policy configuration
Description
Published by the National Vulnerability Database
Apr 3, 2025
Published to the GitHub Advisory Database
Apr 4, 2025
Reviewed
Apr 4, 2025
Last updated
Apr 7, 2025
Summary
Due to a weak Content Security Policy on the
/proxy/*
route, an attacker can bypass the CSP of the media proxy and execute cross-site scripting when opening external images in a new tab/window.Impact
A malicious feed added to Miniflux can execute arbitrary JavaScript in the user's browser when opening external resources, such as proxified images, in a new tab or window.
Mitigation
The CSP for the media proxy has been changed from
default-src 'self'
todefault-src 'none'; form-action 'none'; sandbox;
.Upgrade to Miniflux >= 2.2.7
Credit
RyotaK (GMO Flatt Security Inc.) with takumi-san.ai
References