CVE-2025-54421

7.2 HIGH

📋 TL;DR

This cross-site scripting (XSS) vulnerability in NamelessMC allows authenticated attackers to inject malicious scripts into web pages via the default_keywords parameter. Attackers can steal session cookies, redirect users to malicious sites, or perform actions on behalf of users. Only NamelessMC instances running versions before 2.2.4 are affected.

💻 Affected Systems

Products:
  • NamelessMC
Versions: All versions before 2.2.4
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to exploit. The vulnerability exists in the default_keywords parameter handling.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could steal administrator session cookies, gain full administrative access to the NamelessMC instance, and potentially compromise the underlying server or Minecraft server integration.

🟠

Likely Case

Attackers steal user session cookies to hijack accounts, deface pages, or redirect users to phishing/malware sites.

🟢

If Mitigated

With proper input validation and output encoding, the attack would fail to execute malicious scripts, though the vulnerability would still exist.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

XSS vulnerabilities are commonly weaponized. The advisory shows the exact vulnerable code, making exploitation straightforward for attackers with authenticated access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.2.4

Vendor Advisory: https://github.com/NamelessMC/Nameless/security/advisories/GHSA-f5rm-w4mx-q7rx

Restart Required: No

Instructions:

1. Backup your current NamelessMC installation and database. 2. Download NamelessMC version 2.2.4 from the official repository. 3. Replace all files with the new version, preserving your configuration files. 4. Clear any caching mechanisms. 5. Verify the update completed successfully.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side validation to sanitize the default_keywords parameter by removing HTML/script tags before processing.

Content Security Policy

all

Implement a strict Content Security Policy header to prevent execution of inline scripts and unauthorized sources.

🧯 If You Can't Patch

  • Restrict access to the vulnerable functionality to trusted administrators only.
  • Implement a web application firewall (WAF) with XSS protection rules.

🔍 How to Verify

Check if Vulnerable:

Check if your NamelessMC version is below 2.2.4 by viewing the version in the admin panel or checking the core/init.php file.

Check Version:

Check the 'nameless_version' variable in core/init.php or view the version in the admin dashboard.

Verify Fix Applied:

After updating to 2.2.4, verify the version shows 2.2.4 in the admin panel and test that script injection in default_keywords no longer executes.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests containing script tags in default_keywords parameter
  • Multiple failed login attempts followed by successful authentication and parameter manipulation

Network Indicators:

  • HTTP requests with suspicious script payloads in default_keywords parameter

SIEM Query:

web.url:*default_keywords* AND (web.url:*<script* OR web.url:*javascript:* OR web.url:*onerror=*)

🔗 References

📤 Share & Export