CVE-2025-54414

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-54414
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-54414.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-54414
Aliases
  • GHSA-jhjj-2g64-px7c
Published
2025-07-26T04:16:06Z
Modified
2025-07-29T14:50:01.779837Z
Summary
[none]
Details

Anubis is a Web AI Firewall Utility that weighs the soul of users' connections using one or more challenges in order to protect upstream resources from scraper bots. In versions 1.21.2 and below, attackers can craft malicious pass-challenge pages that cause a user to execute arbitrary JavaScript code or trigger other nonstandard schemes. An incomplete version of this fix was tagged at 1.21.2 and then the release process was aborted upon final testing. To work around this issue: block any requests to the /.within.website/x/cmd/anubis/api/pass-challenge route with the ?redir= parameter set to anything that doesn't start with the URL scheme http, https, or no scheme (local path redirect). This was fixed in version 1.21.3.

References

Affected packages

Git / github.com/techarohq/anubis

Affected ranges

Type
GIT
Repo
https://github.com/techarohq/anubis
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

1.*

1.17.0-beta2

v1.*

v1.12.1
v1.13.0
v1.14.0
v1.14.1
v1.14.2
v1.15.0
v1.16.0
v1.17.0
v1.17.0-beta1
v1.17.0-beta3
v1.17.0-beta4
v1.17.0.signed
v1.17.1
v1.18.0
v1.18.0-pre1
v1.19.0
v1.19.0-pre1
v1.19.1
v1.20.0
v1.20.0-pre1
v1.20.0-pre2
v1.21.0
v1.21.0-pre1
v1.21.0-pre2
v1.21.0-pre3
v1.21.1
v1.21.2