Headline
GHSA-cq88-842x-2jhp: Miniflux Media Proxy vulnerable to Stored Cross-site Scripting due to improper Content-Security-Policy configuration
Summary
Due to a weak Content Security Policy on the /proxy/*
route, an attacker can bypass the CSP of the media proxy and execute cross-site scripting when opening external images in a new tab/window.
Impact
A malicious feed added to Miniflux can execute arbitrary JavaScript in the user’s browser when opening external resources, such as proxified images, in a new tab or window.
Mitigation
The CSP for the media proxy has been changed from default-src 'self'
to default-src 'none'; form-action 'none'; sandbox;
.
Upgrade to Miniflux >= 2.2.7
Credit
RyotaK (GMO Flatt Security Inc.) with takumi-san.ai
- GitHub Advisory Database
- GitHub Reviewed
- CVE-2025-31483
Miniflux Media Proxy vulnerable to Stored Cross-site Scripting due to improper Content-Security-Policy configuration
Moderate severity GitHub Reviewed Published Apr 3, 2025 in miniflux/v2 • Updated Apr 4, 2025
Package
gomod miniflux.app/v2 (Go)
Affected versions
< 2.2.7
Summary
Due to a weak Content Security Policy on the /proxy/* route, an attacker can bypass the CSP of the media proxy and execute cross-site scripting when opening external images in a new tab/window.
Impact
A malicious feed added to Miniflux can execute arbitrary JavaScript in the user’s browser when opening external resources, such as proxified images, in a new tab or window.
Mitigation
The CSP for the media proxy has been changed from default-src ‘self’ to default-src 'none’; form-action 'none’; sandbox;.
Upgrade to Miniflux >= 2.2.7
Credit
RyotaK (GMO Flatt Security Inc.) with takumi-san.ai
References
- GHSA-cq88-842x-2jhp
- miniflux/v2@cb695e6
Published to the GitHub Advisory Database
Apr 4, 2025