CVE-2025-59417 (CNNVD-202509-2925)
中文标题:
Lobe Chat 跨站脚本漏洞
英文标题:
Lobe Chat Desktop Vulnerable to Remote Code Execution via XSS in Chat Messages
漏洞描述
中文描述:
Lobe Chat是LobeHub开源的一个开源、高性能的聊天机器人框架。 Lobe Chat 1.129.4之前版本存在跨站脚本漏洞,该漏洞源于SVGRender组件使用dangerouslySetInnerHTML处理SVG内容,可能导致跨站脚本攻击和远程代码执行。
英文描述:
Lobe Chat is an open-source artificial intelligence chat framework. Prior to version 1.129.4, there is a a cross-site scripting (XSS) vulnerability when handling chat message in lobe-chat that can be escalated to remote code execution on the user’s machine. In lobe-chat, when the response from the server is like <lobeArtifact identifier="ai-new-interpretation" ...> , it will be rendered with the lobeArtifact node, instead of the plain text. However, when the type of the lobeArtifact is image/svg+xml , it will be rendered as the SVGRender component, which internally uses dangerouslySetInnerHTML to set the content of the svg, resulting in XSS attack. Any party capable of injecting content into chat messages, such as hosting a malicious page for prompt injection, operating a compromised MCP server, or leveraging tool integrations, can exploit this vulnerability. This vulnerability is fixed in 1.129.4.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| lobehub | lobe-chat | < 1.129.4 | - | - |
cpe:2.3:a:lobehub:lobe-chat:<_1.129.4:*:*:*:*:*:*:*
|
| lobehub | lobe_chat | * | - | - |
cpe:2.3:a:lobehub:lobe_chat:*:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
CVSS评分详情
4.0 (cna)
MEDIUMCVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2025-59417 |
2025-11-11 15:23:31 | 2025-11-11 07:40:46 |
| NVD | nvd_CVE-2025-59417 |
2025-11-11 15:01:03 | 2025-11-11 07:48:33 |
| CNNVD | cnnvd_CNNVD-202509-2925 |
2025-11-11 15:12:57 | 2025-11-11 08:00:12 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 跨站脚本
- cnnvd_id: 未提取 -> CNNVD-202509-2925
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 1 -> 2
- data_sources: ['cve'] -> ['cve', 'nvd']