OpenZiti is a free and open source project focused on bringing zero trust to any application. An endpoint(/api/upload) on the admin panel can be accessed without any form of authentication. This endpoint accepts an HTTP POST to upload a file which is then stored on the node and is available via URL. This can lead to a stored cross site scripting attack if the file uploaded contains malicious code and is then accessed and executed within the context of the user's browser. This function is no longer necessary as the ziti-console moves from a node server application to a single page application, and has been disabled. The vulnerability is fixed in 3.7.1.
Metrics
Affected Vendors & Products
References
History
Wed, 05 Mar 2025 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Openziti
Openziti openziti |
|
CPEs | cpe:2.3:a:openziti:openziti:*:*:*:*:*:*:*:* | |
Vendors & Products |
Openziti
Openziti openziti |
Tue, 04 Mar 2025 03:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 03 Mar 2025 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | OpenZiti is a free and open source project focused on bringing zero trust to any application. An endpoint(/api/upload) on the admin panel can be accessed without any form of authentication. This endpoint accepts an HTTP POST to upload a file which is then stored on the node and is available via URL. This can lead to a stored cross site scripting attack if the file uploaded contains malicious code and is then accessed and executed within the context of the user's browser. This function is no longer necessary as the ziti-console moves from a node server application to a single page application, and has been disabled. The vulnerability is fixed in 3.7.1. | |
Title | Cross Site Scripting potential in Ziti Console | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-03-03T18:30:48.198Z
Updated: 2025-03-03T20:22:19.785Z
Reserved: 2025-02-26T18:11:52.304Z
Link: CVE-2025-27500

Updated: 2025-03-03T20:22:15.420Z

Status : Analyzed
Published: 2025-03-03T19:15:36.157
Modified: 2025-03-05T20:16:46.363
Link: CVE-2025-27500

No data.