CVE-2025-57203
📋 TL;DR
MagicProject AI version 9.1 has a stored XSS vulnerability in its chatbot generation feature that allows authenticated admin users to inject malicious JavaScript. When other users view affected content, the script executes in their browsers, potentially compromising their sessions. This affects all users of vulnerable MagicProject AI installations.
💻 Affected Systems
- MagicProject AI
📦 What is this software?
Magicai by Liquidlabs
⚠️ Risk & Real-World Impact
Worst Case
Administrative account takeover leading to complete system compromise, data exfiltration, and privilege escalation across the entire application.
Likely Case
Session hijacking of other admin users, allowing attackers to perform unauthorized actions under their identities.
If Mitigated
No impact with proper input sanitization, output encoding, and Content Security Policy enforcement.
🎯 Exploit Status
Requires admin credentials and knowledge of the vulnerable endpoint. Payload must be crafted to bypass any existing filters.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version after 9.1
Vendor Advisory: https://codecanyon.net/item/magicai-openai-content-text-image-chat-code-generator-as-saas/45408109
Restart Required: No
Instructions:
1. Update MagicProject AI to latest version. 2. Verify patch includes input sanitization for /dashboard/user/generator/generate-stream endpoint. 3. Test that HTML/JavaScript in prompt parameter is properly encoded.
🔧 Temporary Workarounds
Implement Content Security Policy
allAdd strict CSP headers to prevent script execution from untrusted sources
Add 'Content-Security-Policy: default-src 'self'; script-src 'self'' to web server configuration
Input Validation Filter
allAdd server-side validation to reject HTML/JavaScript in prompt parameter
Implement regex filter to strip <script> tags and JavaScript event handlers from user input
🧯 If You Can't Patch
- Restrict admin access to trusted users only and monitor for suspicious activity
- Implement web application firewall rules to block XSS payloads in POST requests to vulnerable endpoint
🔍 How to Verify
Check if Vulnerable:
Test by submitting HTML with JavaScript payload to /dashboard/user/generator/generate-stream endpoint and checking if it executes when viewed
Check Version:
Check MagicProject AI admin panel or configuration files for version number
Verify Fix Applied:
Attempt same XSS payload after update and verify it's properly sanitized/encoded in output
📡 Detection & Monitoring
Log Indicators:
- POST requests to /dashboard/user/generator/generate-stream with HTML/JavaScript in parameters
- Unusual admin activity patterns
Network Indicators:
- HTTP traffic containing script tags or JavaScript in POST data to vulnerable endpoint
SIEM Query:
source="web_logs" AND uri_path="/dashboard/user/generator/generate-stream" AND (http_method="POST") AND (request_body CONTAINS "<script>" OR request_body CONTAINS "javascript:")