We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-54800

Hydra persistent XSS in build metrics



Description

Hydra is a continuous integration service for Nix based projects. Prior to commit dea1e16, a malicious package can introduce arbitrary JavaScript code into the Hydra database that is automatically evaluated in a client's browser when anyone visits the build page. This could be done by a third-party project as part of its build process. This also happens in other places like with hydra-release-name. This issue has been patched by commit dea1e16. A workaround involves either not building untrusted packages or not visiting the builds page.

Reserved 2025-07-29 | Published 2025-08-12 | Updated 2025-08-12 | Assigner GitHub_M


HIGH: 7.1CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

< dea1e168f590efb27db32dbacc82b09e15f8ae4b
affected

References

github.com/.../hydra/security/advisories/GHSA-7qwg-q53v-vh99

github.com/...ommit/dea1e168f590efb27db32dbacc82b09e15f8ae4b

cve.org (CVE-2025-54800)

nvd.nist.gov (CVE-2025-54800)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-54800

Support options

Helpdesk Chat, Email, Knowledgebase