{"id":"UBUNTU-CVE-2025-43703","details":"An issue was discovered in Ankitects Anki through 25.02. A crafted shared deck can result in attacker-controlled access to the internal API (even though the attacker has no knowledge of an API key) through approaches such as scripts or the SRC attribute of an IMG element. NOTE: this issue exists because of an incomplete fix for CVE-2024-32484.","modified":"2025-10-24T05:23:32Z","published":"2025-04-16T22:15:00Z","upstream":["CVE-2025-43703"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-43703"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2025-43703"},{"type":"REPORT","url":"https://github.com/ankitects/anki/pull/3925"},{"type":"REPORT","url":"https://github.com/ankitects/anki/pull/3925/commits/24bca15fd3d9dc386916509eb2d4862d1184e709"}],"affected":[{"package":{"name":"anki","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/anki@2.0.32+dfsg-1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.0.32+dfsg-1"],"ecosystem_specific":{"binaries":[{"binary_version":"2.0.32+dfsg-1","binary_name":"anki"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-43703.json"}},{"package":{"name":"anki","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/anki@2.1.0+dfsg~b36-1?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.1.0+dfsg~a12-0.1","2.1.0+dfsg~b24-1","2.1.0+dfsg~b25-1","2.1.0+dfsg~b26-1","2.1.0+dfsg~b27-1","2.1.0+dfsg~b29-1","2.1.0+dfsg~b31-1","2.1.0+dfsg~b33-1","2.1.0+dfsg~b34-1","2.1.0+dfsg~b35-1","2.1.0+dfsg~b36-1"],"ecosystem_specific":{"binaries":[{"binary_version":"2.1.0+dfsg~b36-1","binary_name":"anki"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-43703.json"}},{"package":{"name":"anki","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/anki@2.1.15+dfsg-1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.1.8+dfsg-1ubuntu1","2.1.15+dfsg-1"],"ecosystem_specific":{"binaries":[{"binary_version":"2.1.15+dfsg-1","binary_name":"anki"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-43703.json"}},{"package":{"name":"anki","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/anki@2.1.15+dfsg-3ubuntu0.1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.1.15+dfsg-3","2.1.15+dfsg-3ubuntu0.1"],"ecosystem_specific":{"binaries":[{"binary_version":"2.1.15+dfsg-3ubuntu0.1","binary_name":"anki"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-43703.json"}},{"package":{"name":"anki","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/anki@2.1.15+dfsg-3ubuntu4.1?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.1.15+dfsg-3ubuntu1","2.1.15+dfsg-3ubuntu2","2.1.15+dfsg-3ubuntu3","2.1.15+dfsg-3ubuntu4","2.1.15+dfsg-3ubuntu4.1"],"ecosystem_specific":{"binaries":[{"binary_version":"2.1.15+dfsg-3ubuntu4.1","binary_name":"anki"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-43703.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"type":"Ubuntu","score":"medium"}]}