CVE-2023-27592: Stored XSS in Miniflux when opening a broken image due to unescaped ServerError in proxy handler
4.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.57526%
CWE
Published
4/2/2025
Updated
4/2/2025
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
miniflux.app/v2 | go | >= 2.0.25, < 2.0.43 | 2.0.43 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability chain involves two key functions:
- mediaProxy handler in ui/proxy.go triggers XSS by passing user-controlled error messages from failed image fetches to ServerError
- ServerError in http/response/html/html.go directly outputs unescaped error content without security headers, enabling script execution Patch changes show:
- mediaProxy stopped using ServerError for error responses
- ServerError gained CSP headers to mitigate XSS Runtime detection would see both functions in call stack when processing malicious image requests