Ameeba Exploit Tracker

Tracking CVEs, exploits, and zero-days for defensive cybersecurity research.

Ameeba Blog Search
TRENDING · 1 WEEK
Attack Vector
Vendor
Severity

CVE-2025-5990: Crafty Controller XSS Vulnerability via Server Name and API Key Forms

Ameeba Chat Store screens
Download Ameeba Chat

Overview

Crafty Controller, a widely used server management tool, has been found to contain an input neutralization vulnerability. This flaw, identified as CVE-2025-5990, could potentially allow authenticated remote attackers to perform stored Cross-Site Scripting (XSS) attacks, leading to system compromise or data leakage. The vulnerability underscores the importance of input validation and sanitization in maintaining secure software environments.

Vulnerability Summary

CVE ID: CVE-2025-5990
Severity: High (7.6 CVSS Score)
Attack Vector: Network
Privileges Required: Low
User Interaction: None
Impact: Potential system compromise or data leakage due to stored XSS attacks

Affected Products

Ameeba Chat Icon Escape the Surveillance Era

Most apps won’t tell you the truth.
They’re part of the problem.

Phone numbers. Emails. Profiles. Logs.
It’s all fuel for surveillance.

Ameeba Chat gives you a way out.

  • • No phone number
  • • No email
  • • No personal info
  • • Anonymous aliases
  • • End-to-end encrypted

Chat without a trace.

Product | Affected Versions

Crafty Controller | All versions up to latest

How the Exploit Works

The vulnerability lies in the Server Name and API Key form components of Crafty Controller. An attacker, who has authenticated access, can exploit the flaw by inserting malicious scripts in the input forms. Since the application does not properly neutralize user input, the malicious script is stored and then executed in the user’s browser context when the stored data is accessed or displayed. This could lead to unauthorized access and control over the system, or data theft.

Conceptual Example Code

Here is a conceptual example of an HTTP request that exploits the vulnerability:

POST /api_key_form HTTP/1.1
Host: target.example.com
Content-Type: application/json
Authorization: Bearer <valid_api_key>
{
"api_key": "<script>malicious_script_here</script>"
}

In this example, the attacker uses a valid API key to authenticate and then sends a POST request with a new API key containing a malicious script. When this new API key is displayed or used, the script is executed, exploiting the vulnerability.

Want to discuss this further? Join the Ameeba Cybersecurity Group Chat.

Disclaimer:

The information and code presented in this article are provided for educational and defensive cybersecurity purposes only. Any conceptual or pseudocode examples are simplified representations intended to raise awareness and promote secure development and system configuration practices.

Do not use this information to attempt unauthorized access or exploit vulnerabilities on systems that you do not own or have explicit permission to test.

Ameeba and its authors do not endorse or condone malicious behavior and are not responsible for misuse of the content. Always follow ethical hacking guidelines, responsible disclosure practices, and local laws.
Ameeba Chat