CVE-2025-59430

8.2 HIGH

📋 TL;DR

The Mesh Connect JS SDK prior to version 3.3.2 contains a cross-site scripting (XSS) vulnerability in the createLink.openLink function due to insufficient URL protocol sanitization. This allows attackers to execute arbitrary JavaScript code within the parent page context, potentially accessing DOM, storage, session, and cookies. Any web application using vulnerable versions of the Mesh Connect JS SDK is affected.

💻 Affected Systems

Products:
  • Mesh Connect JS SDK
Versions: All versions prior to 3.3.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects web applications that use the vulnerable SDK functions with user-controllable input.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of user sessions, theft of sensitive data (cookies, storage), account takeover, and potential redirection to malicious sites through DOM manipulation.

🟠

Likely Case

Session hijacking, data theft from browser storage, and unauthorized actions performed within the user's authenticated session.

🟢

If Mitigated

Limited impact if proper Content Security Policy (CSP) headers are implemented and input validation is enforced elsewhere in the application.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires the attacker to control input that reaches the vulnerable function, which could be through user-supplied URLs or parameters.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.3.2

Vendor Advisory: https://github.com/FrontFin/mesh-web-sdk/security/advisories/GHSA-vh3f-qppr-j97f

Restart Required: No

Instructions:

1. Update Mesh Connect JS SDK to version 3.3.2 or later. 2. Update package.json to specify 'mesh-connect-js-sdk': '^3.3.2'. 3. Run npm update or yarn upgrade. 4. Rebuild and redeploy your application.

🔧 Temporary Workarounds

Implement Content Security Policy

all

Add strict CSP headers to prevent execution of inline scripts and restrict script sources.

Content-Security-Policy: script-src 'self' https://trusted.cdn.com; object-src 'none';

Input Validation Sanitization

all

Implement server-side validation to sanitize all user inputs before passing to the SDK functions.

🧯 If You Can't Patch

  • Disable or restrict usage of the createLink.openLink function in your application code.
  • Implement additional client-side input validation to reject URLs with javascript: or other dangerous protocols.

🔍 How to Verify

Check if Vulnerable:

Check your package.json or package-lock.json for mesh-connect-js-sdk version below 3.3.2.

Check Version:

npm list mesh-connect-js-sdk | grep mesh-connect-js-sdk

Verify Fix Applied:

Confirm the installed version is 3.3.2 or higher using npm list mesh-connect-js-sdk or checking package.json.

📡 Detection & Monitoring

Log Indicators:

  • Unusual iframe creation events with custom IDs
  • JavaScript errors related to URL protocol handling
  • Unexpected redirects to javascript: URLs

Network Indicators:

  • Requests containing javascript: protocol in parameters
  • Unexpected iframe source changes

SIEM Query:

source="web_logs" AND (url="*javascript:*" OR referer="*javascript:*")

🔗 References

📤 Share & Export