Vulnerability Description
Miniflux is a feed reader. Due to a weak Content Security Policy on the /proxy/* route, an attacker can bypass the CSP of the media proxy and execute cross-site scripting when opening external images in a new tab/window. To mitigate the vulnerability, the CSP for the media proxy has been changed from default-src 'self' to default-src 'none'; form-action 'none'; sandbox;. This vulnerability is fixed in 2.2.7.
Related Weaknesses (CWE)
References
- https://github.com/miniflux/v2/commit/cb695e653a08af4cabcb277c271ce74bd0c746e6
- https://github.com/miniflux/v2/security/advisories/GHSA-cq88-842x-2jhp
FAQ
What is CVE-2025-31483?
CVE-2025-31483 is a documented vulnerability. Miniflux is a feed reader. Due to a weak Content Security Policy on the /proxy/* route, an attacker can bypass the CSP of the media proxy and execute cross-site scripting when opening external images ...
How severe is CVE-2025-31483?
CVSS scoring is not yet available for CVE-2025-31483. Check NVD for updates.
Is there a patch for CVE-2025-31483?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.