CVE-2025-64027
Description
Snipe-IT v8.3.4 (build 20218) contains a reflected cross-site scripting (XSS) vulnerability in the CSV Import workflow. When an invalid CSV file is uploaded, the application returns a progress_message value that is rendered as raw HTML in the admin interface. An attacker can intercept and modify the POST /livewire/update request to inject arbitrary HTML or JavaScript into the progress_message. Because the server accepts the modified input without sanitization and reflects it back to the user, arbitrary JavaScript executes in the browser of any authenticated admin who views the import page. NOTE: this is disputed by the Supplier because the report only demonstrates that an authenticated user can choose to conduct a man-in-the-middle attack against himself.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Snipe-IT v8.3.4 has a reflected XSS in the CSV Import workflow where an attacker can inject arbitrary JavaScript via the progress_message parameter.
Vulnerability
Overview
CVE-2025-64027 describes a reflected cross-site scripting (XSS) vulnerability in Snipe-IT v8.3.4 (build 20218) within the CSV Import workflow. When an invalid CSV file is uploaded, the application returns a progress_message value is rendered as raw HTML in the admin interface without sanitization [1][3]. The root cause is that the server accepts user-supplied input for the progress_message parameter in the POST /livewire/update` POST request and reflects it back to the client without proper validation or encoding [1][3].
Exploitation
An attacker can exploit this by intercepting and modifying the POST /livewire/update request, injecting arbitrary HTML or JavaScript into the progress_message field. This requires the attacker to be in a position to perform a man-in-the-middle (MitM) attack on the authenticated admin's session, or to trick the admin into uploading a crafted CSV file while the attacker controls the network [1][3]. The injected payload is then reflected back to the admin's browser executes in the context of the Snipe-IT admin interface [3].
Impact
Successful exploitation allows an attacker to execute arbitrary JavaScript with admin privileges. This could lead to theft of session cookies, modification of assets, users, or other sensitive data, and installation of browser-based payloads [3]. The vulnerability is considered to have high impact on confidentiality and integrity, with low impact on availability [3].
Mitigation
As of the publication date, no patch has been released. The vendor disputes the finding, arguing that the attack only demonstrates that an authenticated user can choose to conduct a man-in-the-middle attack against himself [1]. Users should ensure that the CSV Import page is accessed only over trusted networks and consider implementing additional network-level protections such as HTTPS with HSTS to reduce the risk of MitM attacks.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
snipe/snipe-itPackagist | <= 8.3.4 | — |
Affected products
2- Snipe-IT/Snipe-ITdescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/advisories/GHSA-8x9v-8qgj-945xghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-64027ghsaADVISORY
News mentions
0No linked articles in our index yet.