We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-49126

Visionatrix Vulnerable to Reflected XSS Leading to Exfiltration of Secrets



Description

Visionatrix is an AI Media processing tool using ComfyUI. In versions 1.5.0 to before 2.5.1, the /docs/flows endpoint is vulnerable to a Reflected XSS (Cross-Site Scripting) attack allowing full takeover of the application and exfiltration of secrets stored in the application. The implementation uses the get_swagger_ui_html function from FastAPI. This function does not encode or sanitize its arguments before using them to generate the HTML for the swagger documentation page and is not intended to be used with user-controlled arguments. Any user of this application can be targeted with a one-click attack that can takeover their session and all the secrets that may be contained within it. This issue has been patched in version 2.5.1.

Reserved 2025-06-02 | Published 2025-06-23 | Updated 2025-06-23 | Assigner GitHub_M


HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:L

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

>= 1.5.0, < 2.5.1
affected

References

github.com/...natrix/security/advisories/GHSA-w36r-9jvx-q48v

github.com/...ommit/63aafe6e4d1bffe4bf69e73b6fdfc65c71a8f5b8

cve.org (CVE-2025-49126)

nvd.nist.gov (CVE-2025-49126)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-49126

Support options

Helpdesk Chat, Email, Knowledgebase