Miggo Logo

CVE-2025-24803: MobSF Stored Cross-Site Scripting (XSS)

8.1

CVSS Score
3.1

Basic Information

EPSS Score
0.2645%
Published
2/5/2025
Updated
2/26/2025
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
mobsfpip<= 4.3.04.3.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the dynamic_analysis.html template line 406, where the 'bundle' variable (controlled by an attacker via modified Info.plist) is directly interpolated into an HTML event handler attribute without proper escaping. The client-side list_apps() function constructs this HTML element using jQuery's append() method. The lack of HTML entity escaping for the 'bundle' parameter in the onclick="remove_app(this, '${bundle}')" call allows breaking out of the JavaScript string context and executing arbitrary code. The commit fix explicitly adds escapeHtml() around the bundle variable in this context, confirming this as the vulnerable code path.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

**Pro*u*t:** Mo*S* **V*rsion:** < *.*.* ***W*-I*:** *W*-**: Improp*r N*utr*liz*tion o* Input *urin* W** P*** **n*r*tion ('*ross-sit* S*riptin*') ***VSS v**tor v.*.*:** *.* (*V:N/**:L/*T:N/PR:N/UI:P/V*:*/VI:*/V*:N/S*:N/SI:N/S*:N) ***VSS v**tor v.*.*:*

Reasoning

T** vuln*r**ility st*ms *rom t** *yn*mi*_*n*lysis.*tml t*mpl*t* lin* ***, w**r* t** '*un*l*' v*ri**l* (*ontroll** *y *n *tt**k*r vi* mo*i*i** In*o.plist) is *ir**tly int*rpol*t** into *n *TML *v*nt **n*l*r *ttri*ut* wit*out prop*r *s**pin*. T** *li*n