ChatGPTUtil Self Cross-Site Scripting Vulnerability
漏洞信息
漏洞名称: ChatGPTUtil Self Cross-Site Scripting Vulnerability
漏洞编号:
- CVE: CVE-2025-51863
漏洞类型: 跨站可执行脚本
漏洞等级: 中危
漏洞描述: ChatGPTUtil是一款AI驱动的聊天机器人助手,提供对ChatGPT和AI图像生成器的访问。该产品广泛应用于需要AI聊天和图像生成服务的场景,用户群体广泛。漏洞存在于聊天组件中,具体表现为自跨站脚本(Self-XSS)漏洞。这种漏洞的技术根源在于聊天界面未能对用户输入进行充分的过滤和验证,导致恶意脚本可以被执行。攻击者可以通过网络向受害者传递恶意负载(如SVG XSS负载),当受害者将负载粘贴到ChatGPTUtil聊天界面时,攻击即可发生。此漏洞可能导致用户的cookie(包含会话和令牌)被窃取,进而导致远程账户劫持。尽管攻击需要用户交互(即粘贴恶意负载),但由于社交工程的存在,这种攻击仍然具有较高的实际威胁。
产品厂商: ChatGPTUtil
产品名称: ChatGPTUtil
来源: https://github.com/Secsys-FDU/CVE-2025-51863
类型: CVE-2025:github search
仓库文件
- README.md
- figure1.png
来源概述
CVE-2025-51863
Vulnerability description
ChatGPTUtil is a AI-powered chatbot assistant, providing access to both ChatGPT and an AI image generator. A Self Cross-Site Scripting (Self-XSS) vulnerability exists in the chat component. This can lead to cookie theft leading to remote account hijacking.
Attack Vectors
The attack vector is the Network. To exploit this XSS vulnerability, an attacker must craft a malicious payload (i.e., an SVG XSS payload) and deliver it to the victim (e.g., via email, a malicious website, a forum post, or an instant message). The attack occurs when the victim pastes the payload into the ChatGPTUtil chat interface. The POC as following:
1 |
|
Vulnerability affected
This vulnerability can have an impact on any user of https://www.chatgptunli.com. The cookie (contains the session and token) of user will be stolen when pastes the payload into the chat interface.