CVE-2025-30210
📋 TL;DR
Bruno API IDE versions before 1.39.1 contain a cross-site scripting vulnerability where environment names are injected as raw HTML. This allows execution of malicious scripts when users hover over environment names in collections imported from untrusted sources. Only users who import and open malicious Bruno/Postman collections are affected.
💻 Affected Systems
- Bruno API IDE
📦 What is this software?
Bruno by Usebruno
⚠️ Risk & Real-World Impact
Worst Case
Arbitrary JavaScript execution in Bruno IDE context, potentially allowing local file access, credential theft, or system compromise depending on Bruno's permissions.
Likely Case
Limited impact since exploitation requires user to import malicious collections and hover over specific elements; most likely used for targeted attacks against developers.
If Mitigated
No impact if users only import collections from trusted sources or have updated to patched version.
🎯 Exploit Status
Exploitation requires social engineering to get user to import malicious collection and hover over environment name.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.39.1
Vendor Advisory: https://github.com/usebruno/bruno/security/advisories/GHSA-fqxc-cxph-9vq8
Restart Required: Yes
Instructions:
1. Open Bruno IDE
2. Go to Settings/About
3. Check for updates or manually download v1.39.1+
4. Install update and restart Bruno
🔧 Temporary Workarounds
Avoid untrusted collections
allOnly import Bruno/Postman collections from trusted sources; verify collection contents before importing.
Disable environment tooltips
allAvoid hovering over environment names in collections if source is untrusted.
🧯 If You Can't Patch
- Implement strict collection import policies - only allow verified sources
- Train developers to inspect collection files before importing and avoid hovering on untrusted environment names
🔍 How to Verify
Check if Vulnerable:
Check Bruno version in Settings/About menu; if version is below 1.39.1, system is vulnerable.
Check Version:
In Bruno: Settings → About → Version
Verify Fix Applied:
Confirm version is 1.39.1 or higher in Settings/About menu.
📡 Detection & Monitoring
Log Indicators:
- No specific log indicators for this client-side vulnerability
Network Indicators:
- No network-based detection as exploit is local
SIEM Query:
Not applicable - client-side desktop application vulnerability