Cross-site Scripting (XSS) Affecting logstash-9.1-env2yaml package, versions *


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.04% (11th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Scripting (XSS) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-MINIMOSLATEST-LOGSTASH91ENV2YAML-15352424
  • published26 Feb 2026
  • disclosed18 Feb 2026

Introduced: 18 Feb 2026

NewCVE-2026-25500  (opens in a new tab)
CWE-79  (opens in a new tab)

How to fix?

There is no fixed version for Minimos:latest logstash-9.1-env2yaml.

NVD Description

Note: Versions mentioned in the description apply only to the upstream logstash-9.1-env2yaml package and not the logstash-9.1-env2yaml package as distributed by Minimos. See How to fix? for Minimos:latest relevant fixed versions and status.

Rack is a modular Ruby web server interface. Prior to versions 2.2.22, 3.1.20, and 3.2.5, Rack::Directory generates an HTML directory index where each file entry is rendered as a clickable link. If a file exists on disk whose basename starts with the javascript: scheme (e.g. javascript:alert(1)), the generated index contains an anchor whose href is exactly javascript:alert(1). Clicking the entry executes JavaScript in the browser (demonstrated with alert(1)). Versions 2.2.22, 3.1.20, and 3.2.5 fix the issue.

CVSS Base Scores

version 3.1