Description

OpenZiti is a free and open source project focused on bringing zero trust to any application. An endpoint(/api/upload) on the admin panel can be accessed without any form of authentication. This endpoint accepts an HTTP POST to upload a file which is then stored on the node and is available via URL. This can lead to a stored cross site scripting attack if the file uploaded contains malicious code and is then accessed and executed within the context of the user's browser. This function is no longer necessary as the ziti-console moves from a node server application to a single page application, and has been disabled. The vulnerability is fixed in 3.7.1.

INFO

Published Date :

2025-03-03T18:30:48.198Z

Last Modified :

2025-03-03T20:22:19.785Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2025-27500 vulnerability.

Vendors Products
Openziti
  • Openziti
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-27500.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact