Vulnerability Description
listmonk is a standalone, self-hosted, newsletter and mailing list manager. In versions up to and including 1.1.0, every http request in addition to the session cookie `session` there included `nonce`. The value is not checked and validated by the backend, removing `nonce` allows the requests to be processed correctly. This may seem harmless, but if chained to other vulnerabilities it can become a critical vulnerability. Cross-site request forgery and cross-site scripting chained together can result in improper admin account creation. As of time of publication, no patched versions are available.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Nadh | Listmonk | <= 1.1.0 |
Related Weaknesses (CWE)
References
- https://github.com/knadh/listmonk/security/advisories/GHSA-rf24-wg77-gq7wExploitThird Party Advisory
- https://github.com/knadh/listmonk/security/advisories/GHSA-rf24-wg77-gq7wExploitThird Party Advisory
FAQ
What is CVE-2025-58430?
CVE-2025-58430 is a vulnerability with a CVSS score of 6.1 (MEDIUM). listmonk is a standalone, self-hosted, newsletter and mailing list manager. In versions up to and including 1.1.0, every http request in addition to the session cookie `session` there included `nonce`...
How severe is CVE-2025-58430?
CVE-2025-58430 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-58430?
Check the references section above for vendor advisories and patch information. Affected products include: Nadh Listmonk.