CVE-2025-67202
XSS Vulnerability in Sidekiq-cron via Malicious URL
Publication date: 2026-05-07
Last updated on: 2026-05-07
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| sidekiq-cron | sidekiq-cron | to 2.4.0 (exc) |
| sidekiq-cron | sidekiq-cron | 2.4.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability in sidekiq-cron allows for reflected Cross-Site Scripting (XSS) attacks that could lead to theft of cookies, session data, or local storage information from the application where the Sidekiq-cron web UI is mounted.
Such unauthorized access to sensitive user data could potentially impact compliance with data protection regulations like GDPR and HIPAA, which require safeguarding personal and sensitive information against unauthorized access or breaches.
However, the provided information does not explicitly discuss the direct impact on compliance with these standards or any regulatory consequences.
What immediate steps should I take to mitigate this vulnerability?
The primary immediate mitigation step is to upgrade sidekiq-cron to version 2.4.0 or later, where this reflected XSS vulnerability has been fixed.
This update not only addresses the XSS issue by improving input handling and adding defense-in-depth security measures but also includes Content Security Policies (CSPs) to reduce the risk of script injection.
If upgrading immediately is not possible, consider implementing strict Content Security Policies (CSPs) on the Sidekiq-UI web interface and restricting access to the admin UI to trusted users only.
Also, monitor and block suspicious requests that attempt to inject scripts via GET parameters as a temporary protective measure.
Can you explain this vulnerability to me?
CVE-2025-67202 is a reflected Cross-Site Scripting (XSS) vulnerability in the Sidekiq-cron gem, specifically in its Sidekiq-UI component. This vulnerability occurs because the application improperly handles GET request parameters, allowing an attacker to inject malicious JavaScript code via crafted URLs rendered in the cron.erb template.
The vulnerability affects the admin web UI endpoints and can be exploited by an attacker with super-user privileges or by tricking an authorized user into clicking a malicious link. This leads to execution of arbitrary JavaScript code in the context of the victim's browser.
How can this vulnerability impact me? :
This vulnerability can allow attackers to execute arbitrary JavaScript code in the browser of an authorized user or administrator. The consequences include theft of cookies, session data, or local storage information, which can lead to account compromise or unauthorized access to sensitive information.
Because the vulnerability targets the admin UI, it can potentially allow attackers to hijack administrative sessions or perform actions on behalf of the administrator, increasing the risk to the overall security of the system.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
The vulnerability is a reflected Cross-Site Scripting (XSS) issue in the Sidekiq-UI component of the sidekiq-cron gem, specifically affecting admin web UI endpoints. Detection involves monitoring for suspicious or crafted URLs targeting the cron namespaces endpoint that inject HTML or JavaScript tags.
Since the vulnerability stems from improper handling of GET request parameters, you can detect attempts by inspecting web server logs or using web application firewall (WAF) rules to identify requests containing suspicious script tags or HTML injections in URLs.
Example commands to detect such attempts might include searching logs for suspicious patterns. For instance, using grep on access logs to find potential XSS payloads:
- grep -iE "<script|%3Cscript|javascript:" /path/to/sidekiq-cron/access.log
- grep -iE "<img|onerror=|<svg" /path/to/sidekiq-cron/access.log
Additionally, using security scanning tools or automated scanners that test for reflected XSS vulnerabilities on the Sidekiq-UI endpoints can help detect this issue.