We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-46559

Misskey Directory Traversal Vulnerability in AiScript via `Mk:api`



Description

Misskey is an open source, federated social media platform. Starting in version 12.31.0 and prior to version 2025.4.1, missing validation in `Mk:api` allows malicious AiScript code to access additional endpoints that it isn't designed to have access to. The missing validation allows malicious AiScript code to prefix a URL with `../` to step out of the `/api` directory, thereby being able to make requests to other endpoints, such as `/files`, `/url`, and `/proxy`. Version 2025.4.1 fixes the issue.

Reserved 2025-04-24 | Published 2025-05-05 | Updated 2025-05-05 | Assigner GitHub_M


MEDIUM: 5.4CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:H/A:N

Problem types

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

>= 12.31.0, < 2025.4.1
affected

References

github.com/...isskey/security/advisories/GHSA-gmq6-738q-vjp2

github.com/...ommit/583df3ec63e25a1fd34def0dac13405396b8b663

cve.org (CVE-2025-46559)

nvd.nist.gov (CVE-2025-46559)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-46559

Support options

Helpdesk Chat, Email, Knowledgebase