Description
OpenZiti is a free and open source project focused on bringing zero trust to any application. An endpoint(/api/upload) on the admin panel can be accessed without any form of authentication. This endpoint accepts an HTTP POST to upload a file which is then stored on the node and is available via URL. This can lead to a stored cross site scripting attack if the file uploaded contains malicious code and is then accessed and executed within the context of the user's browser. This function is no longer necessary as the ziti-console moves from a node server application to a single page application, and has been disabled. The vulnerability is fixed in 3.7.1.
INFO
Published Date :
2025-03-03T18:30:48.198Z
Last Modified :
2025-03-03T20:22:19.785Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2025-27500 vulnerability.
| Vendors | Products |
|---|---|
| Openziti |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2025-27500.