CVE-2025-58361

Promptcraft · Promptcraft Forge Studio

**A critical Cross-Site Scripting (XSS) vulnerability in all versions of Promptcraft Forge Studio allows an attacker to bypass security checks and execute malicious scripts, potentially leading to acc.

Executive summary

A critical Cross-Site Scripting (XSS) vulnerability in all versions of Promptcraft Forge Studio allows an attacker to bypass security checks and execute malicious scripts, potentially leading to account takeover and data theft.

Vulnerability

The application suffers from a Cross-Site Scripting (XSS) vulnerability due to a non-exhaustive URL scheme check. An unauthenticated attacker can craft a malicious link that, when clicked by a victim, executes arbitrary scripts in the victim's browser within the context of their application session.

Business impact

This vulnerability is rated Critical with a CVSS score of 9.3, indicating a severe impact. An attacker could exploit this flaw to hijack authenticated user sessions, steal sensitive data including credentials and API keys, deface the application, or redirect users to malicious websites. This could lead to unauthorized access to LLM-powered applications, data exfiltration, and significant reputational damage.

Remediation

Immediate Action: Update Promptcraft Forge Studio to the latest patched version immediately. Instruct users to be cautious of unexpected links related to the application.

Proactive Monitoring: Review web server and application logs for suspicious URL patterns or evidence of script injection attempts. Monitor for any unauthorized changes or access to user accounts.

Compensating Controls: Implement a Web Application Firewall (WAF) with robust XSS detection rules as a virtual patch. Enforce strict Content Security Policy (CSP) headers to prevent the execution of untrusted scripts.

Exploitation status

Public Exploit Available: unknown

Analyst recommendation

The high severity of this XSS vulnerability requires immediate remediation. The potential for session hijacking and data theft from a core development toolkit presents a significant risk. Administrators must prioritize the deployment of the vendor-supplied update across all instances to protect user accounts and sensitive application data.