CVE-2025-49126

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-49126
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-49126.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-49126
Aliases
  • GHSA-w36r-9jvx-q48v
Published
2025-06-23T18:15:21Z
Modified
2025-06-27T11:13:57.011540Z
Summary
[none]
Details

Visionatrix is an AI Media processing tool using ComfyUI. In versions 1.5.0 to before 2.5.1, the /docs/flows endpoint is vulnerable to a Reflected XSS (Cross-Site Scripting) attack allowing full takeover of the application and exfiltration of secrets stored in the application. The implementation uses the getswaggerui_html function from FastAPI. This function does not encode or sanitize its arguments before using them to generate the HTML for the swagger documentation page and is not intended to be used with user-controlled arguments. Any user of this application can be targeted with a one-click attack that can takeover their session and all the secrets that may be contained within it. This issue has been patched in version 2.5.1.

References

Affected packages

Git / github.com/visionatrix/visionatrix

Affected ranges

Type
GIT
Repo
https://github.com/visionatrix/visionatrix
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.0.2
v0.0.3
v0.0.4
v0.0.5
v0.0.6
v0.0.7
v0.0.8
v0.0.9
v0.1.0
v0.2.0
v0.3.0
v0.4.0
v0.5.0
v0.6.0
v0.7.0
v0.7.1
v0.8.0
v0.9.0

v1.*

v1.0.0
v1.0.1
v1.1.0
v1.10.0
v1.11.0
v1.11.1
v1.2.0
v1.3.0
v1.4.0
v1.4.1
v1.5.0
v1.6.0
v1.7.0
v1.8.0
v1.9.0

v2.*

v2.0.0
v2.0.1.dev0
v2.1.0
v2.2.0
v2.3.0
v2.4.0
v2.4.1
v2.5.0