VYPR
Low severity2.4GHSA Advisory· Published Apr 19, 2025· Updated Apr 15, 2026

CVE-2025-3801

CVE-2025-3801

Description

A vulnerability was found in songquanpeng one-api up to 0.6.10. It has been classified as problematic. This affects an unknown part of the component System Setting Handler. The manipulation of the argument Homepage Content/About System/Footer leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A stored XSS vulnerability in songquanpeng one-api up to 0.6.10 allows an attacker with settings privileges to inject arbitrary scripts via the Homepage Content, About System, or Footer fields.

Analysis

A stored cross-site scripting (XSS) vulnerability exists in the songquanpeng one-api application up to version 0.6.10. The flaw resides in the System Setting Handler component, where user input supplied to the 'Homepage Content', 'About System', and 'Footer' arguments is not properly sanitized before being stored and later rendered in the administrative interface [1][2]. This allows an attacker to inject arbitrary JavaScript or HTML into these fields.

To exploit this vulnerability, an attacker must first authenticate as a user with privileges to modify system settings [3]. Once authenticated, the attacker can navigate to the affected settings pages and insert malicious payloads, such as `` into the Homepage Content field [3]. The injected script is then stored on the server and executed in the browsers of other users who visit the impacted pages.

The impact of successful exploitation is limited due to the low CVSS base score (2.4) and the requirement for authenticated access with elevated privileges. An attacker could potentially deface the application interface, steal session cookies, or perform actions on behalf of other users who view the compromised pages. The vulnerability is classified as problematic and has a publicly available proof-of-concept [3].

Mitigation

As of the publication date, version 0.6.10 and earlier are affected. Users should monitor the official GitHub repository [1] for a patched release. No workaround is documented in the references, so administrators should apply input sanitization to these settings fields or restrict modification privileges to trusted users only.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
github.com/songquanpeng/one-apiGo
<= 0.6.10

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.