VYPR
Moderate severityNVD Advisory· Published Nov 20, 2025· Updated Nov 26, 2025

CVE-2025-64027

CVE-2025-64027

Description

Snipe-IT v8.3.4 (build 20218) contains a reflected cross-site scripting (XSS) vulnerability in the CSV Import workflow. When an invalid CSV file is uploaded, the application returns a progress_message value that is rendered as raw HTML in the admin interface. An attacker can intercept and modify the POST /livewire/update request to inject arbitrary HTML or JavaScript into the progress_message. Because the server accepts the modified input without sanitization and reflects it back to the user, arbitrary JavaScript executes in the browser of any authenticated admin who views the import page. NOTE: this is disputed by the Supplier because the report only demonstrates that an authenticated user can choose to conduct a man-in-the-middle attack against himself.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Snipe-IT v8.3.4 has a reflected XSS in the CSV Import workflow where an attacker can inject arbitrary JavaScript via the progress_message parameter.

Vulnerability

Overview

CVE-2025-64027 describes a reflected cross-site scripting (XSS) vulnerability in Snipe-IT v8.3.4 (build 20218) within the CSV Import workflow. When an invalid CSV file is uploaded, the application returns a progress_message value is rendered as raw HTML in the admin interface without sanitization [1][3]. The root cause is that the server accepts user-supplied input for the progress_message parameter in the POST /livewire/update` POST request and reflects it back to the client without proper validation or encoding [1][3].

Exploitation

An attacker can exploit this by intercepting and modifying the POST /livewire/update request, injecting arbitrary HTML or JavaScript into the progress_message field. This requires the attacker to be in a position to perform a man-in-the-middle (MitM) attack on the authenticated admin's session, or to trick the admin into uploading a crafted CSV file while the attacker controls the network [1][3]. The injected payload is then reflected back to the admin's browser executes in the context of the Snipe-IT admin interface [3].

Impact

Successful exploitation allows an attacker to execute arbitrary JavaScript with admin privileges. This could lead to theft of session cookies, modification of assets, users, or other sensitive data, and installation of browser-based payloads [3]. The vulnerability is considered to have high impact on confidentiality and integrity, with low impact on availability [3].

Mitigation

As of the publication date, no patch has been released. The vendor disputes the finding, arguing that the attack only demonstrates that an authenticated user can choose to conduct a man-in-the-middle attack against himself [1]. Users should ensure that the CSV Import page is accessed only over trusted networks and consider implementing additional network-level protections such as HTTPS with HSTS to reduce the risk of MitM attacks.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
snipe/snipe-itPackagist
<= 8.3.4

Affected products

2
  • Snipe-IT/Snipe-ITdescription
  • Snipe/Snipe Itllm-fuzzy
    Range: = v6.4.2 build 20218

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.