CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2025-49004: Hijacking Caido instance during the initial setup via DNS Rebinding to achieve RCE

7.5 CVSS

Description

Caido is a web security auditing toolkit. Prior to version 0.48.0, due to the lack of protection for DNS rebinding, Caido can be loaded on an attacker-controlled domain. This allows a malicious website to hijack the authentication flow of Caido and achieve code execution. A malicious website loaded in the browser can hijack the locally running Caido instance and achieve remote command execution during the initial setup. Even if the Caido instance is already configured, an attacker can initiate the authentication flow by performing DNS rebinding. In this case, the victim needs to authorize the request on dashboard.caido.io. Users should upgrade to version 0.48.0 to receive a patch.

Classification

CVE ID: CVE-2025-49004

CVSS Base Severity: HIGH

CVSS Base Score: 7.5

CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

Problem Types

CWE-290: Authentication Bypass by Spoofing

Affected Products

Vendor: caido

Product: caido

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.2% (probability of being exploited)

EPSS Percentile: 42.34% (scored less or equal to compared to others)

EPSS Date: 2025-06-14 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2025-49004
https://github.com/caido/caido/security/advisories/GHSA-jmxf-xw2r-vjrg

Timeline