CVE-2025-64027

Snipe-IT v8.3.4 (build 20218) contains a reflected cross-site scripting (XSS) vulnerability in the CSV Import workflow. When an invalid CSV file is uploaded, the application returns a progress_message value that is rendered as raw HTML in the admin interface. An attacker can intercept and modify the POST /livewire/update request to inject arbitrary HTML or JavaScript into the progress_message. Because the server accepts the modified input without sanitization and reflects it back to the user, arbitrary JavaScript executes in the browser of any authenticated admin who views the import page. NOTE: this is disputed by the Supplier because the report only demonstrates that an authenticated user can choose to conduct a man-in-the-middle attack against himself.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:snipeitapp:snipe-it:8.3.4:*:*:*:*:*:*:*

History

26 Nov 2025, 16:15

Type Values Removed Values Added
Summary (en) Snipe-IT v8.3.4 (build 20218) contains a reflected cross-site scripting (XSS) vulnerability in the CSV Import workflow. When an invalid CSV file is uploaded, the application returns a progress_message value that is rendered as raw HTML in the admin interface. An attacker can intercept and modify the POST /livewire/update request to inject arbitrary HTML or JavaScript into the progress_message. Because the server accepts the modified input without sanitization and reflects it back to the user, arbitrary JavaScript executes in the browser of any authenticated admin who views the import page. (en) Snipe-IT v8.3.4 (build 20218) contains a reflected cross-site scripting (XSS) vulnerability in the CSV Import workflow. When an invalid CSV file is uploaded, the application returns a progress_message value that is rendered as raw HTML in the admin interface. An attacker can intercept and modify the POST /livewire/update request to inject arbitrary HTML or JavaScript into the progress_message. Because the server accepts the modified input without sanitization and reflects it back to the user, arbitrary JavaScript executes in the browser of any authenticated admin who views the import page. NOTE: this is disputed by the Supplier because the report only demonstrates that an authenticated user can choose to conduct a man-in-the-middle attack against himself.

24 Nov 2025, 14:44

Type Values Removed Values Added
First Time Snipeitapp snipe-it
Snipeitapp
References () https://github.com/cybercrewinc/CVE-2025-64027/ - () https://github.com/cybercrewinc/CVE-2025-64027/ - Exploit, Third Party Advisory
References () https://github.com/grokability/snipe-it - () https://github.com/grokability/snipe-it - Product
CPE cpe:2.3:a:snipeitapp:snipe-it:8.3.4:*:*:*:*:*:*:*

20 Nov 2025, 22:16

Type Values Removed Values Added
CWE CWE-79
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1

20 Nov 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-20 17:15

Updated : 2025-11-26 16:15


NVD link : CVE-2025-64027

Mitre link : CVE-2025-64027

CVE.ORG link : CVE-2025-64027


JSON object : View

Products Affected

snipeitapp

  • snipe-it
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')