Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-496g-mmpw-j9x3

Опубликовано: 15 дек. 2025
Источник: github
Github: Прошло ревью
CVSS4: 7.1
CVSS3: 6.5

Описание

misskey.js's export data contains private post data

Summary

After adding private posts (followers, direct) that you do not have permission to view to your favorites or clips, you can export them to view the contents of the private posts.

PoC

  1. Create an account (X) for testing and an account (Y) for private posts on the same server.
  2. Send appropriate content from Y using "Follow"
  3. Send appropriate content to any user using "Nominate" from Y
  4. Obtain the URLs for the two posts above using Y's account.
  5. Query the URLs for the two posts using X and add them to your favorites or clips.
  6. Export your favorites or clips using X.
  7. Check the exported data.

Note: Verified in v2025.11.1

Impact

This could allow an attacker to view the contents of private posts. If you have pinned private posts, this could be a real problem, as the ID of the private post can be obtained by viewing the user page on the original server.

Пакеты

Наименование

misskey-js

npm
Затронутые версииВерсия исправления

>= 13.0.0-beta.16, < 2025.12.0

2025.12.0

EPSS

Процентиль: 11%
0.00038
Низкий

7.1 High

CVSS4

6.5 Medium

CVSS3

Дефекты

CWE-862

Связанные уязвимости

CVSS3: 6.5
nvd
около 2 месяцев назад

Misskey is an open source, federated social media platform. Starting in version 13.0.0-beta.16 and prior to version 2025.12.0, an actor who does not have permission to view favorites or clips can can export the posts and view the contents. Version 2025.12.0 fixes the issue.

EPSS

Процентиль: 11%
0.00038
Низкий

7.1 High

CVSS4

6.5 Medium

CVSS3

Дефекты

CWE-862