We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-49004

Hijacking Caido instance during the initial setup via DNS Rebinding to achieve RCE



Description

Caido is a web security auditing toolkit. Prior to version 0.48.0, due to the lack of protection for DNS rebinding, Caido can be loaded on an attacker-controlled domain. This allows a malicious website to hijack the authentication flow of Caido and achieve code execution. A malicious website loaded in the browser can hijack the locally running Caido instance and achieve remote command execution during the initial setup. Even if the Caido instance is already configured, an attacker can initiate the authentication flow by performing DNS rebinding. In this case, the victim needs to authorize the request on dashboard.caido.io. Users should upgrade to version 0.48.0 to receive a patch.

Reserved 2025-05-29 | Published 2025-06-09 | Updated 2025-06-09 | Assigner GitHub_M


HIGH: 7.5CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

Problem types

CWE-290: Authentication Bypass by Spoofing

Product status

< 0.48.0
affected

References

github.com/.../caido/security/advisories/GHSA-jmxf-xw2r-vjrg

cve.org (CVE-2025-49004)

nvd.nist.gov (CVE-2025-49004)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-49004

Support options

Helpdesk Chat, Email, Knowledgebase