CVE-2025-55014

4.7 MEDIUM

📋 TL;DR

The YouDao plugin in StarDict sends X11 clipboard selections to remote servers via unencrypted HTTP, exposing potentially sensitive copied text to network eavesdroppers. This affects users of StarDict with the YouDao plugin enabled on Debian trixie and other distributions. The vulnerability allows passive interception of clipboard contents sent to dict.youdao.com and dict.cn servers.

💻 Affected Systems

Products:
  • StarDict
  • StarDict-GTK
Versions: 3.0.7+git20220909+dfsg-6 and earlier in Debian trixie; other distributions using vulnerable YouDao plugin
Operating Systems: Debian trixie, Linux distributions with StarDict
Default Config Vulnerable: ⚠️ Yes
Notes: Requires YouDao plugin to be enabled and used for dictionary lookups. The vulnerability is in the plugin's HTTP communication.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers on the same network could intercept sensitive clipboard contents (passwords, credentials, private data) when users copy text that gets sent to the dictionary servers.

🟠

Likely Case

Passive network monitoring could capture dictionary lookup queries containing copied text, potentially revealing search terms or other non-critical information.

🟢

If Mitigated

With proper network segmentation and HTTPS enforcement, the risk is limited to local network threats only.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires network access to intercept HTTP traffic. No authentication bypass needed as the traffic is cleartext.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Debian security updates for fixed version

Vendor Advisory: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110370

Restart Required: No

Instructions:

1. Update StarDict via package manager: sudo apt update && sudo apt upgrade stardict 2. Alternatively, disable the YouDao plugin in StarDict preferences

🔧 Temporary Workarounds

Disable YouDao Plugin

all

Prevent the vulnerable plugin from sending data by disabling it in StarDict configuration

Open StarDict → Preferences → Dictionary → Uncheck YouDao dictionary

Network Traffic Blocking

linux

Block HTTP traffic to dict.youdao.com and dict.cn at firewall level

sudo iptables -A OUTPUT -p tcp -d dict.youdao.com --dport 80 -j DROP
sudo iptables -A OUTPUT -p tcp -d dict.cn --dport 80 -j DROP

🧯 If You Can't Patch

  • Disable the YouDao plugin in StarDict preferences immediately
  • Use network segmentation to isolate systems running StarDict from untrusted networks

🔍 How to Verify

Check if Vulnerable:

Check if YouDao plugin is enabled in StarDict preferences and if version is vulnerable: dpkg -l | grep stardict

Check Version:

dpkg -l | grep stardict

Verify Fix Applied:

Verify updated package version and confirm YouDao plugin is disabled or patched

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to dict.youdao.com or dict.cn from StarDict process

Network Indicators:

  • Cleartext HTTP traffic to dict.youdao.com:80 or dict.cn:80 containing X11 selection data

SIEM Query:

source_ip=* AND dest_ip IN (dict.youdao.com, dict.cn) AND dest_port=80 AND process_name="stardict"

🔗 References

📤 Share & Export