Description
Miniflux is a feed reader. Due to a weak Content Security Policy on the /proxy/* route, an attacker can bypass the CSP of the media proxy and execute cross-site scripting when opening external images in a new tab/window. To mitigate the vulnerability, the CSP for the media proxy has been changed from default-src 'self' to default-src 'none'; form-action 'none'; sandbox;. This vulnerability is fixed in 2.2.7.
References (2)
Core 2
Core References
Vendor Advisory x_refsource_confirm
https://github.com/miniflux/v2/security/advisories/GHSA-cq88-842x-2jhp
Patch x_refsource_misc
https://github.com/miniflux/v2/commit/cb695e653a08af4cabcb277c271ce74bd0c746e6
Scores
CVSS v4
4.8
EPSS
0.0027
EPSS Percentile
50.4%
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-79
Status
published
Products (2)
miniflux/v2
< 2.2.7
miniflux.app/v2
0 - 2.2.7Go
Published
Apr 03, 2025
Tracked Since
Feb 18, 2026