CVE-2025-57203

4.8 MEDIUM

📋 TL;DR

MagicProject AI version 9.1 has a stored XSS vulnerability in its chatbot generation feature that allows authenticated admin users to inject malicious JavaScript. When other users view affected content, the script executes in their browsers, potentially compromising their sessions. This affects all users of vulnerable MagicProject AI installations.

💻 Affected Systems

Products:
  • MagicProject AI
Versions: 9.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated admin access to exploit. All deployments with vulnerable version are affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Administrative account takeover leading to complete system compromise, data exfiltration, and privilege escalation across the entire application.

🟠

Likely Case

Session hijacking of other admin users, allowing attackers to perform unauthorized actions under their identities.

🟢

If Mitigated

No impact with proper input sanitization, output encoding, and Content Security Policy enforcement.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires admin credentials and knowledge of the vulnerable endpoint. Payload must be crafted to bypass any existing filters.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 9.1

Vendor Advisory: https://codecanyon.net/item/magicai-openai-content-text-image-chat-code-generator-as-saas/45408109

Restart Required: No

Instructions:

1. Update MagicProject AI to latest version. 2. Verify patch includes input sanitization for /dashboard/user/generator/generate-stream endpoint. 3. Test that HTML/JavaScript in prompt parameter is properly encoded.

🔧 Temporary Workarounds

Implement Content Security Policy

all

Add strict CSP headers to prevent script execution from untrusted sources

Add 'Content-Security-Policy: default-src 'self'; script-src 'self'' to web server configuration

Input Validation Filter

all

Add server-side validation to reject HTML/JavaScript in prompt parameter

Implement regex filter to strip <script> tags and JavaScript event handlers from user input

🧯 If You Can't Patch

  • Restrict admin access to trusted users only and monitor for suspicious activity
  • Implement web application firewall rules to block XSS payloads in POST requests to vulnerable endpoint

🔍 How to Verify

Check if Vulnerable:

Test by submitting HTML with JavaScript payload to /dashboard/user/generator/generate-stream endpoint and checking if it executes when viewed

Check Version:

Check MagicProject AI admin panel or configuration files for version number

Verify Fix Applied:

Attempt same XSS payload after update and verify it's properly sanitized/encoded in output

📡 Detection & Monitoring

Log Indicators:

  • POST requests to /dashboard/user/generator/generate-stream with HTML/JavaScript in parameters
  • Unusual admin activity patterns

Network Indicators:

  • HTTP traffic containing script tags or JavaScript in POST data to vulnerable endpoint

SIEM Query:

source="web_logs" AND uri_path="/dashboard/user/generator/generate-stream" AND (http_method="POST") AND (request_body CONTAINS "<script>" OR request_body CONTAINS "javascript:")

🔗 References

📤 Share & Export