CVE-2025-3801
Description
A vulnerability was found in songquanpeng one-api up to 0.6.10. It has been classified as problematic. This affects an unknown part of the component System Setting Handler. The manipulation of the argument Homepage Content/About System/Footer leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A stored XSS vulnerability in songquanpeng one-api up to 0.6.10 allows an attacker with settings privileges to inject arbitrary scripts via the Homepage Content, About System, or Footer fields.
Analysis
A stored cross-site scripting (XSS) vulnerability exists in the songquanpeng one-api application up to version 0.6.10. The flaw resides in the System Setting Handler component, where user input supplied to the 'Homepage Content', 'About System', and 'Footer' arguments is not properly sanitized before being stored and later rendered in the administrative interface [1][2]. This allows an attacker to inject arbitrary JavaScript or HTML into these fields.
To exploit this vulnerability, an attacker must first authenticate as a user with privileges to modify system settings [3]. Once authenticated, the attacker can navigate to the affected settings pages and insert malicious payloads, such as `` into the Homepage Content field [3]. The injected script is then stored on the server and executed in the browsers of other users who visit the impacted pages.
The impact of successful exploitation is limited due to the low CVSS base score (2.4) and the requirement for authenticated access with elevated privileges. An attacker could potentially deface the application interface, steal session cookies, or perform actions on behalf of other users who view the compromised pages. The vulnerability is classified as problematic and has a publicly available proof-of-concept [3].
Mitigation
As of the publication date, version 0.6.10 and earlier are affected. Users should monitor the official GitHub repository [1] for a patched release. No workaround is documented in the references, so administrators should apply input sanitization to these settings fields or restrict modification privileges to trusted users only.
- GitHub - songquanpeng/one-api: LLM API 管理 & 分发系统,支持 OpenAI、Azure、Anthropic Claude、Google Gemini、DeepSeek、字节豆包、ChatGLM、文心一言、讯飞星火、通义千问、360 智脑、腾讯混元等主流模型,统一 API 适配,可用于 key 管理与二次分发。单可执行文件,提供 Docker 镜像,一键部署,开箱即用。LLM API management & key redistribution system, unifying multiple providers under a single API. Single binary, Docker-ready, with an E…
- NVD - CVE-2025-3801
- Poc/One-API/One-API-poc.md at main · yaowenxiao721/Poc
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/songquanpeng/one-apiGo | <= 0.6.10 | — |
Affected products
1- Range: <= 0.6.10
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/advisories/GHSA-wvcx-j62q-45qwghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-3801ghsaADVISORY
- github.com/yaowenxiao721/Poc/blob/main/One-API/One-API-poc.mdnvdWEB
- vuldb.comnvdWEB
- vuldb.comnvdWEB
- vuldb.comnvdWEB
News mentions
0No linked articles in our index yet.