CVE-2025-59053
BaseFortify
Publication date: 2025-09-11
Last updated on: 2025-09-15
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| dompurify | dompurify | ^3.2.6 |
| moeru-ai | airi | 0.7.2-beta.3 |
| moeru-ai | airi | 0.7.2-beta.2 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-94 | The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in AIRI v0.7.2-beta.2 involves improper handling of Markdown content where malicious HTML/JavaScript can be injected and rendered directly into the DOM without escaping, leading to cross-site scripting (XSS). Additionally, the exposed Tauri API allows arbitrary command execution because user-supplied commands and arguments are passed directly to the system without validation. An attacker can exploit the XSS to execute arbitrary system commands. The issue is fixed in v0.7.2-beta.3.
How can this vulnerability impact me? :
This vulnerability can lead to severe impacts including unauthorized execution of arbitrary commands on the host system, full compromise of the application, data theft, data manipulation, and potential system takeover. The cross-site scripting can be used to execute malicious scripts in users' browsers, and the command execution interface can be exploited to run any system command, leading to high confidentiality, integrity, and availability risks.
What immediate steps should I take to mitigate this vulnerability?
Upgrade AIRI to version v0.7.2-beta.3 or later, as this version fixes the vulnerability by addressing the unsafe rendering of Markdown content and the command execution interface. Avoid processing untrusted Markdown content with the vulnerable versions and restrict access to the Tauri API to prevent exploitation.