CVE-2025-30219
RabbitMQ vulnerability analysis and mitigation

Overview

RabbitMQ versions prior to 4.0.3 contain a cross-site scripting (XSS) vulnerability in the management UI. When a virtual host on a RabbitMQ node fails to start, the management UI displays an error message containing the virtual host name, which was not properly escaped prior to open source RabbitMQ 4.0.3 and Tanzu RabbitMQ 4.0.3, 3.13.8. This vulnerability was discovered and responsibly disclosed by a security research team at Best of the Best (GitHub Advisory).

Technical details

The vulnerability stems from improper sanitization of virtual host names in error messages displayed by the management UI. An attacker could exploit this by first causing a virtual host to fail to start, and then creating a new virtual host name containing malicious JavaScript code or modifying an existing virtual host name on disk. This could lead to arbitrary JavaScript code execution in the management UI within users' browsers. The vulnerability has been assigned a CVSS v3.1 base score of 6.1 (Medium) with vector string CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:L (GitHub Advisory).

Impact

A successful exploitation of this vulnerability could allow attackers to execute arbitrary JavaScript code in the browsers of management UI users. This could potentially lead to unauthorized access to sensitive information or perform actions on behalf of the affected users (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in open source RabbitMQ version 4.0.3 and Tanzu RabbitMQ versions 4.0.3 and 3.13.8. Users are advised to upgrade to these versions. For users unable to upgrade immediately, a recommended workaround is to disable the management plugin and use alternative monitoring solutions such as Prometheus and Grafana (GitHub Advisory).

Community reactions

The vulnerability was researched and responsibly disclosed by a team at Best of the Best, including Dain Lee, Eojin Lee, WooJin Park, MinJung Lee, and SeChang Oh. The vendor has acknowledged their contribution in identifying and reporting this security issue (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related RabbitMQ vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2022-31008HIGH7.5
  • NixOSNixOS
  • erlang-rabbitmq-client313
NoYesOct 06, 2022
CVE-2025-50200MEDIUM6.7
  • RabbitMQRabbitMQ
  • rabbitmq-server
NoYesJun 19, 2025
CVE-2025-30219MEDIUM6.1
  • RabbitMQRabbitMQ
  • rabbitmq-server-plugins
NoYesMar 25, 2025
CVE-2023-50966MEDIUM5.3
  • RabbitMQRabbitMQ
  • erlang-jose
NoYesMar 19, 2024
CVE-2023-46118MEDIUM4.9
  • NixOSNixOS
  • erlang26-src
NoYesOct 25, 2023

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management