We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability, which was classified as problematic, was found in Zylon PrivateGPT up to 0.6.2. This affects an unknown part of the file settings.yaml. The manipulation of the argument allow_origins leads to permissive cross-domain policy with untrusted domains. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Es wurde eine problematische Schwachstelle in Zylon PrivateGPT bis 0.6.2 gefunden. Es betrifft eine unbekannte Funktion der Datei settings.yaml. Durch Manipulation des Arguments allow_origins mit unbekannten Daten kann eine permissive cross-domain policy with untrusted domains-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.
Permissive Cross-domain Policy with Untrusted Domains
2025-05-09: | Advisory disclosed |
2025-05-09: | VulDB entry created |
2025-05-09: | VulDB entry last update |
Jiacheng Gavin Zhong
Zhengyu Liu
Gavin Zhong (VulDB User)
Gavin Zhong (VulDB User)
vuldb.com/?id.308235 (VDB-308235 | Zylon PrivateGPT settings.yaml cross-domain policy)
vuldb.com/?ctiid.308235 (VDB-308235 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.564451 (Submit #564451 | PrivateGPT 0.6.2 CWE-942: Permissive Cross-domain Policy with Untrusted Domains)
gist.github.com/...rboy-zjc/2a727cb0c1d468f21a91e0416d006ffe
Support options