First published: Thu Apr 03 2025(Updated: )
## Summary Due to a weak Content Security Policy on the `/proxy/*` route, an attacker can bypass the CSP of the media proxy and execute cross-site scripting when opening external images in a new tab/window. ## Impact A malicious feed added to Miniflux can execute arbitrary JavaScript in the user's browser when opening external resources, such as proxified images, in a new tab or window. ## Mitigation The CSP for the media proxy has been changed from `default-src 'self'` to `default-src 'none'; form-action 'none'; sandbox;`. Upgrade to Miniflux >= 2.2.7 ## Credit [RyotaK](https://ryotak.net) (GMO Flatt Security Inc.) with [takumi-san.ai](https://takumi-san.ai)
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Miniflux | <2.2.7 | |
go/miniflux.app/v2 | <2.2.7 | 2.2.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-31483 has been classified as a moderate severity vulnerability due to its potential for cross-site scripting attacks.
To fix CVE-2025-31483, update to Miniflux version 2.2.7 or later, which implements a more stringent Content Security Policy for the media proxy.
CVE-2025-31483 can allow attackers to execute cross-site scripting when users open external images, potentially compromising user data.
CVE-2025-31483 is present in all versions of Miniflux prior to version 2.2.7.
CVE-2025-31483 affects the /proxy/* route in Miniflux, specifically related to the media proxy's Content Security Policy.