Overview
Crafty Controller, a widely used server management tool, has been found to contain an input neutralization vulnerability. This flaw, identified as CVE-2025-5990, could potentially allow authenticated remote attackers to perform stored Cross-Site Scripting (XSS) attacks, leading to system compromise or data leakage. The vulnerability underscores the importance of input validation and sanitization in maintaining secure software environments.
Vulnerability Summary
CVE ID: CVE-2025-5990
Severity: High (7.6 CVSS Score)
Attack Vector: Network
Privileges Required: Low
User Interaction: None
Impact: Potential system compromise or data leakage due to stored XSS attacks
Affected Products
Escape the Surveillance Era
Most apps won’t tell you the truth.
They’re part of the problem.
Phone numbers. Emails. Profiles. Logs.
It’s all fuel for surveillance.
Ameeba Chat gives you a way out.
- • No phone number
- • No email
- • No personal info
- • Anonymous aliases
- • End-to-end encrypted
Chat without a trace.
Product | Affected Versions
Crafty Controller | All versions up to latest
How the Exploit Works
The vulnerability lies in the Server Name and API Key form components of Crafty Controller. An attacker, who has authenticated access, can exploit the flaw by inserting malicious scripts in the input forms. Since the application does not properly neutralize user input, the malicious script is stored and then executed in the user’s browser context when the stored data is accessed or displayed. This could lead to unauthorized access and control over the system, or data theft.
Conceptual Example Code
Here is a conceptual example of an HTTP request that exploits the vulnerability:
POST /api_key_form HTTP/1.1
Host: target.example.com
Content-Type: application/json
Authorization: Bearer <valid_api_key>
{
"api_key": "<script>malicious_script_here</script>"
}
In this example, the attacker uses a valid API key to authenticate and then sends a POST request with a new API key containing a malicious script. When this new API key is displayed or used, the script is executed, exploiting the vulnerability.

