CVE-2025-23039

5.2 MEDIUM

📋 TL;DR

A Cross-Site Scripting (XSS) vulnerability in Caido v0.45.0 allows attackers to execute arbitrary JavaScript in the URL decoding tooltip of HTTP request/response editors. This could lead to session hijacking, credential theft, or other malicious actions. All users of Caido v0.45.0 are affected.

💻 Affected Systems

Products:
  • Caido
Versions: v0.45.0 only
Operating Systems: All platforms running Caido
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the web interface component of Caido. Requires user interaction with malicious content in the URL decoding tooltip.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker steals authentication tokens, gains full access to Caido instance, and pivots to internal systems or steals sensitive security audit data.

🟠

Likely Case

Attacker steals session cookies or authentication tokens, gaining unauthorized access to the Caido web interface and potentially compromising security audit results.

🟢

If Mitigated

Limited impact due to proper network segmentation and access controls, with potential for minor data exposure but no system compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction with crafted content in the URL decoding tooltip. No authentication bypass needed once user accesses malicious content.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v0.45.1

Vendor Advisory: https://github.com/caido/caido/security/advisories/GHSA-3mfw-fhfp-mgrv

Restart Required: Yes

Instructions:

1. Stop Caido service. 2. Backup configuration and data. 3. Download Caido v0.45.1 from official sources. 4. Install/upgrade to v0.45.1. 5. Restart Caido service. 6. Verify functionality.

🧯 If You Can't Patch

  • Restrict network access to Caido web interface to trusted users only using firewall rules or VPN.
  • Implement Content Security Policy (CSP) headers if supported by Caido configuration.

🔍 How to Verify

Check if Vulnerable:

Check Caido version via web interface or configuration files. If version is exactly 0.45.0, system is vulnerable.

Check Version:

Check Caido web interface dashboard or configuration files for version information.

Verify Fix Applied:

Verify Caido version shows 0.45.1 or higher in web interface or configuration.

📡 Detection & Monitoring

Log Indicators:

  • Unusual JavaScript execution in web interface logs
  • Multiple failed authentication attempts following suspicious web activity

Network Indicators:

  • Unusual outbound connections from Caido server
  • Suspicious HTTP requests containing script tags or encoded payloads

SIEM Query:

web_logs WHERE (url CONTAINS "<script>" OR url CONTAINS "javascript:") AND application="caido"

🔗 References

📤 Share & Export