CVE-2025-27088

Public Exploit
Reflected Cross-site Scripting (XSS) in template implementation in oxyno-zeta/s3-proxy

Description

oxyno-zeta/s3-proxy is an aws s3 proxy written in go. In affected versions a Reflected Cross-site Scripting (XSS) vulnerability enables attackers to create malicious URLs that, when visited, inject scripts into the web application. This can lead to session hijacking or phishing attacks on a trusted domain, posing a moderate risk to all users. It's possible to inject html elements, including scripts through the folder-list template. The affected template allows users to interact with the URL path provided by the `Request.URL.Path` variable, which is then rendered directly into the HTML without proper sanitization or escaping. This can be abused by attackers who craft a malicious URL containing injected HTML or JavaScript. When users visit such a URL, the malicious script will be executed in the user's context. This issue has been addressed in version 4.18.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

Category

8.4
CVSS
Severity: High
CVSS 4.0 •
CVSS 3.1 •
EPSS 0.05%
Vendor Advisory github.com
Affected: oxyno-zeta s3-proxy
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2025-27088?
CVE-2025-27088 has been scored as a high severity vulnerability.
How to fix CVE-2025-27088?
To fix CVE-2025-27088, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2025-27088 being actively exploited in the wild?
It is possible that CVE-2025-27088 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2025-27088?
CVE-2025-27088 affects oxyno-zeta s3-proxy.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.