{"id":81721,"date":"2025-10-04T12:28:57","date_gmt":"2025-10-04T12:28:57","guid":{"rendered":""},"modified":"2025-10-21T04:13:22","modified_gmt":"2025-10-21T10:13:22","slug":"cve-2025-56795-stored-cross-site-scripting-vulnerability-in-mealie-recipe-creation-functionality","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2025-56795-stored-cross-site-scripting-vulnerability-in-mealie-recipe-creation-functionality\/","title":{"rendered":"<strong>CVE-2025-56795: Stored Cross-Site Scripting Vulnerability in Mealie Recipe Creation Functionality<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>Cross-Site Scripting (XSS) vulnerabilities are a common and pervasive class of web application security flaws that represent a significant risk to both businesses and their consumers. In this article, we will be discussing a stored XSS vulnerability in Mealie 3.0.1 and earlier, identified as CVE-2025-56795. This vulnerability affects the <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2024-41148-serious-code-injection-vulnerability-in-robot-operating-system-ros\/\"  data-wpil-monitor-id=\"88932\">recipe creation<\/a> functionality and could potentially lead to system compromise or data leakage if exploited.<br \/>\nThis <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-9872-remote-code-execution-vulnerability-in-ivanti-endpoint-manager-due-to-insufficient-filename-validation\/\"  data-wpil-monitor-id=\"89162\">vulnerability is particularly significant due<\/a> to the high CVSS severity score of 9.0, which indicates a major potential impact. Any entity using Mealie 3.0.1 or earlier in their systems should take immediate notice and apply the necessary mitigations to prevent potential exploits.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2025-56795<br \/>\nSeverity: Critical (CVSS 9.0)<br \/>\nAttack Vector: Network<br \/>\nPrivileges Required: None<br \/>\nUser Interaction: Required<br \/>\nImpact: <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-9364-critical-open-database-issue-resulting-in-potential-system-compromise\/\"  data-wpil-monitor-id=\"89060\">System compromise or potential<\/a> data leakage<\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-1455761248\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p>Mealie | 3.0.1 and earlier<\/p>\n<p><strong>How the Exploit Works<\/strong><\/p>\n<p>The <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-9693-arbitrary-file-deletion-vulnerability-in-user-meta-user-profile-builder-plugin-for-wordpress\/\"  data-wpil-monitor-id=\"90597\">vulnerability originates from unsanitized user<\/a> input in the &#8220;note&#8221; and &#8220;text&#8221; fields of the &#8220;\/api\/recipes\/{recipe_name}&#8221; endpoint. The input is rendered in the frontend without proper escaping. An attacker could exploit this flaw by injecting malicious scripts into these fields. As a result, when the payload is rendered on the frontend, the malicious script is executed in the context of the victim&#8217;s session, <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-9443-buffer-overflow-vulnerability-in-tenda-ch22-1-0-0-1-potentially-leads-to-system-compromise\/\"  data-wpil-monitor-id=\"89017\">potentially leading to system<\/a> compromise or data leakage.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p><div id=\"ameeb-2939875572\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<p>Below is a conceptual example of how the vulnerability might be exploited. This is a sample HTTP request where the attacker injects a malicious script into the &#8220;note&#8221; field:<\/p>\n<pre><code class=\"\" data-line=\"\">POST \/api\/recipes\/{recipe_name} HTTP\/1.1\nHost: target.example.com\nContent-Type: application\/json\n{\n&quot;note&quot;: &quot;&lt;script&gt;malicious code here&lt;\/script&gt;&quot;,\n&quot;text&quot;: &quot;normal input&quot;\n}<\/code><\/pre>\n<p>In this example, the malicious <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-24404-xml-injection-remote-code-execution-vulnerability-in-apache-hertzbeat\/\"  data-wpil-monitor-id=\"88962\">code within the script tags would be executed<\/a> whenever the note is rendered on the frontend. The actual malicious code would depend on the intent of the attacker, and could range from stealing session cookies, to performing actions on behalf of the user, to loading external malicious content.<\/p>\n<p><strong>Mitigation Guidance<\/strong><\/p>\n<p>It is strongly recommended to apply the vendor-provided patch to fix this vulnerability. If for any reason the patch cannot be applied immediately, using a Web Application Firewall (WAF) or Intrusion Detection System (IDS) can provide temporary mitigation. However, these measures are not a long-term solution and the patch should be applied as soon as <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-10534-critical-firefox-and-thunderbird-vulnerability-leading-to-possible-system-compromise-and-data-leakage\/\"  data-wpil-monitor-id=\"89446\">possible to fully secure your system<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview Cross-Site Scripting (XSS) vulnerabilities are a common and pervasive class of web application security flaws that represent a significant risk to both businesses and their consumers. In this article, we will be discussing a stored XSS vulnerability in Mealie 3.0.1 and earlier, identified as CVE-2025-56795. This vulnerability affects the recipe creation functionality and could [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[1],"tags":[],"vendor":[],"product":[],"attack_vector":[81],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-81721","post","type-post","status-publish","format-standard","hentry","category-uncategorized","attack_vector-xss"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/81721","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=81721"}],"version-history":[{"count":7,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/81721\/revisions"}],"predecessor-version":[{"id":83541,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/81721\/revisions\/83541"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=81721"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=81721"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=81721"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=81721"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=81721"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=81721"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=81721"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=81721"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=81721"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}