Snipe-IT v8.3.4 (build 20218) contains a reflected cross-site scripting (XSS) vulnerability in the CSV Import workflow. When an invalid CSV file is uploaded, the application returns a progress_message value that is rendered as raw HTML in the admin interface. An attacker can intercept and modify the POST /livewire/update request to inject arbitrary HTML or JavaScript into the progress_message. Because the server accepts the modified input without sanitization and reflects it back to the user, arbitrary JavaScript executes in the browser of any authenticated admin who views the import page. NOTE: this is disputed by the Supplier because the report only demonstrates that an authenticated user can choose to conduct a man-in-the-middle attack against himself.
History

Wed, 26 Nov 2025 16:00:00 +0000

Type Values Removed Values Added
Description Snipe-IT v8.3.4 (build 20218) contains a reflected cross-site scripting (XSS) vulnerability in the CSV Import workflow. When an invalid CSV file is uploaded, the application returns a progress_message value that is rendered as raw HTML in the admin interface. An attacker can intercept and modify the POST /livewire/update request to inject arbitrary HTML or JavaScript into the progress_message. Because the server accepts the modified input without sanitization and reflects it back to the user, arbitrary JavaScript executes in the browser of any authenticated admin who views the import page. Snipe-IT v8.3.4 (build 20218) contains a reflected cross-site scripting (XSS) vulnerability in the CSV Import workflow. When an invalid CSV file is uploaded, the application returns a progress_message value that is rendered as raw HTML in the admin interface. An attacker can intercept and modify the POST /livewire/update request to inject arbitrary HTML or JavaScript into the progress_message. Because the server accepts the modified input without sanitization and reflects it back to the user, arbitrary JavaScript executes in the browser of any authenticated admin who views the import page. NOTE: this is disputed by the Supplier because the report only demonstrates that an authenticated user can choose to conduct a man-in-the-middle attack against himself.

Mon, 24 Nov 2025 14:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:snipeitapp:snipe-it:8.3.4:*:*:*:*:*:*:*

Mon, 24 Nov 2025 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Snipeitapp
Snipeitapp snipe-it
Vendors & Products Snipeitapp
Snipeitapp snipe-it

Thu, 20 Nov 2025 22:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-79
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 20 Nov 2025 16:45:00 +0000

Type Values Removed Values Added
Description Snipe-IT v8.3.4 (build 20218) contains a reflected cross-site scripting (XSS) vulnerability in the CSV Import workflow. When an invalid CSV file is uploaded, the application returns a progress_message value that is rendered as raw HTML in the admin interface. An attacker can intercept and modify the POST /livewire/update request to inject arbitrary HTML or JavaScript into the progress_message. Because the server accepts the modified input without sanitization and reflects it back to the user, arbitrary JavaScript executes in the browser of any authenticated admin who views the import page.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-11-20T00:00:00.000Z

Updated: 2025-11-26T15:41:47.300Z

Reserved: 2025-10-27T00:00:00.000Z

Link: CVE-2025-64027

cve-icon Vulnrichment

Updated: 2025-11-20T21:37:38.777Z

cve-icon NVD

Status : Modified

Published: 2025-11-20T17:15:52.873

Modified: 2025-11-26T16:15:50.103

Link: CVE-2025-64027

cve-icon Redhat

No data.