CVE-2025-58430

Source
https://cve.org/CVERecord?id=CVE-2025-58430
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-58430.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-58430
Aliases
Downstream
Related
Published
2025-09-09T19:37:45.468Z
Modified
2026-04-27T04:11:34.300983Z
Severity
  • 8.6 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N CVSS Calculator
Summary
listmonk Vulnerable to CSRF to XSS Chain That Can Lead to Admin Account Takeover
Details

listmonk is a standalone, self-hosted, newsletter and mailing list manager. In versions up to and including 1.1.0, every http request in addition to the session cookie session there included nonce. The value is not checked and validated by the backend, removing nonce allows the requests to be processed correctly. This may seem harmless, but if chained to other vulnerabilities it can become a critical vulnerability. Cross-site request forgery and cross-site scripting chained together can result in improper admin account creation. As of time of publication, no patched versions are available.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/58xxx/CVE-2025-58430.json",
    "cwe_ids": [
        "CWE-352",
        "CWE-79",
        "CWE-80"
    ],
    "cna_assigner": "GitHub_M"
}
References

Affected packages

Git / github.com/knadh/listmonk

Affected ranges

Type
GIT
Repo
https://github.com/knadh/listmonk
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "last_affected": "1.1.0"
        }
    ]
}

Affected versions

v0.*
v0.1.0-alpha
v0.1.1-alpha
v0.1.2-alpha
v0.2.0-alpha
v0.2.1-alpha
v0.2.2-alpha
v0.3.0-alpha
v0.3.1-alpha
v0.3.2-alpha
v0.3.3-alpha
v0.4.0-alpha
v0.5.0-alpha
v0.5.1-alpha
v0.5.2-alpha
v0.6.0-alpha
v0.6.1-alpha
v0.6.2-alpha
v0.7.0-alpha
v0.8.0-beta
v0.9.0-beta
v1.*
v1.0.0
v1.1.0

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-58430.json"