Caido is a web security auditing toolkit. Prior to version 0.53.0, the Markdown renderer used in Caido’s Findings page improperly handled user-supplied Markdown, allowing attacker-controlled links to be rendered without confirmation. When a user opened a finding generated through the scanner, or other plugins, clicking these injected links could redirect the Caido application to an attacker-controlled domain, enabling phishing style attacks. This issue has been patched in version 0.53.0.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 26 Nov 2025 02:45:00 +0000

Type Values Removed Values Added
Description Caido is a web security auditing toolkit. Prior to version 0.53.0, the Markdown renderer used in Caido’s Findings page improperly handled user-supplied Markdown, allowing attacker-controlled links to be rendered without confirmation. When a user opened a finding generated through the scanner, or other plugins, clicking these injected links could redirect the Caido application to an attacker-controlled domain, enabling phishing style attacks. This issue has been patched in version 0.53.0.
Title Caido Improperly Handles External Links in Markdown
Weaknesses CWE-74
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-11-26T01:59:06.790Z

Reserved: 2025-11-21T01:08:02.614Z

Link: CVE-2025-66025

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-11-26T03:15:58.277

Modified: 2025-11-26T03:15:58.277

Link: CVE-2025-66025

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.