CVE-2025-55473

6.1 MEDIUM

📋 TL;DR

This Cross-Site Scripting (XSS) vulnerability in AATF Website allows attackers to inject malicious JavaScript via the X-Forwarded-For header, which executes in visitors' browsers. It affects all users accessing the vulnerable /ip.php endpoint. Organizations running AATF Website v5.1.x or Docker version 2024.12.8.1 are impacted.

💻 Affected Systems

Products:
  • Asian Arts Talents Foundation (AATF) Website
  • AATF Docker container
Versions: v5.1.x and Docker version 2024.12.8.1
Operating Systems: Any OS running the affected software
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments using the vulnerable /ip.php endpoint are affected regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker steals session cookies, credentials, or performs actions as authenticated users, potentially leading to account takeover and data theft.

🟠

Likely Case

Attacker injects malicious scripts to deface website, redirect users to phishing sites, or steal session information from visitors.

🟢

If Mitigated

Limited impact with proper Content Security Policy (CSP) headers and browser security features blocking script execution.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending HTTP requests with malicious X-Forwarded-For headers to the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check GitHub repository for latest version

Vendor Advisory: https://github.com/AATF/aatf.us

Restart Required: No

Instructions:

1. Update to latest version from GitHub repository. 2. For Docker deployments: pull latest image and redeploy container. 3. Verify /ip.php endpoint properly sanitizes X-Forwarded-For header output.

🔧 Temporary Workarounds

Disable /ip.php endpoint

all

Remove or block access to the vulnerable endpoint

# Web server configuration to block /ip.php
# Example for Apache: Redirect 403 /ip.php
# Example for Nginx: location /ip.php { deny all; }

Implement WAF rules

all

Add Web Application Firewall rules to sanitize X-Forwarded-For headers

# ModSecurity rule example
SecRule REQUEST_HEADERS:X-Forwarded-For "@rx <script" "id:1001,phase:1,deny,status:403"

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to prevent script execution
  • Deploy a reverse proxy or WAF to sanitize X-Forwarded-For headers before reaching application

🔍 How to Verify

Check if Vulnerable:

Send HTTP request to /ip.php with X-Forwarded-For header containing test payload like <script>alert('test')</script> and check if script executes

Check Version:

# For web version: check source code or admin panel
# For Docker: docker inspect aatf/aatf.us | grep version

Verify Fix Applied:

Test with same payload after patching - script should be properly encoded/escaped in output

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /ip.php with suspicious X-Forwarded-For headers containing script tags or JavaScript

Network Indicators:

  • Unusual traffic patterns to /ip.php endpoint
  • Multiple requests with varying X-Forwarded-For headers

SIEM Query:

source="web_logs" AND uri_path="/ip.php" AND (http_header="X-Forwarded-For" CONTAINS "<script" OR http_header="X-Forwarded-For" CONTAINS "javascript:")

🔗 References

📤 Share & Export