Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2021-25933: Cross-Site Scripting in OpenNMS

0
Medium
VulnerabilityCVE-2021-25933cvecve-2021-25933
Published: Thu May 20 2021 (05/20/2021, 14:59:24 UTC)
Source: CVE
Vendor/Project: n/a
Product: OpenNMS

Description

In OpenNMS Horizon, versions opennms-1-0-stable through opennms-27.1.0-1; OpenNMS Meridian, versions meridian-foundation-2015.1.0-1 through meridian-foundation-2019.1.18-1; meridian-foundation-2020.1.0-1 through meridian-foundation-2020.1.6-1 are vulnerable to Stored Cross-Site Scripting, since the function `validateFormInput()` performs improper validation checks on the input sent to the `groupName` and `groupComment` parameters. Due to this flaw, an authenticated attacker could inject arbitrary script and trick other admin users into downloading malicious files which can cause severe damage to the organization using opennms.

AI-Powered Analysis

AILast updated: 06/25/2025, 12:48:09 UTC

Technical Analysis

CVE-2021-25933 is a Stored Cross-Site Scripting (XSS) vulnerability affecting multiple versions of OpenNMS Horizon and OpenNMS Meridian, specifically versions from opennms-1-0-stable through opennms-27.1.0-1 and meridian-foundation-2015.1.0-1 through meridian-foundation-2020.1.6-1. The vulnerability arises due to improper input validation in the function `validateFormInput()`, which fails to adequately sanitize user-supplied data in the `groupName` and `groupComment` parameters. This flaw allows an authenticated attacker to inject arbitrary malicious scripts into the application. When other administrative users access the affected interface or data, these scripts can execute in their browsers, potentially enabling the attacker to perform actions such as tricking admins into downloading malicious files or stealing session tokens. The vulnerability requires the attacker to have authenticated access with elevated privileges (admin-level), and user interaction is necessary for the malicious script to execute (i.e., another admin must view the injected content). The CVSS v3.1 base score is 4.8 (medium severity), reflecting network attack vector, low attack complexity, high privileges required, user interaction required, and limited impact on confidentiality and integrity with no impact on availability. No known exploits have been reported in the wild, and no official patches or mitigations are linked in the provided data, indicating that organizations must proactively address this issue. The vulnerability is categorized under CWE-79, which is a common web application security weakness related to improper neutralization of input leading to XSS.

Potential Impact

For European organizations using OpenNMS Horizon or Meridian for network management and monitoring, this vulnerability poses a risk primarily to the confidentiality and integrity of administrative sessions and data. Successful exploitation could allow attackers to execute arbitrary scripts in the context of admin users, potentially leading to session hijacking, unauthorized actions within the management console, or distribution of malicious payloads to trusted users. This could disrupt network monitoring operations, cause data manipulation, or facilitate further compromise of the IT environment. Given that OpenNMS is often deployed in critical infrastructure, telecommunications, and enterprise environments, the impact could extend to operational disruptions and data breaches. However, the requirement for authenticated admin access and user interaction limits the attack surface, reducing the likelihood of widespread exploitation. Nonetheless, insider threats or compromised admin credentials could be leveraged to exploit this vulnerability. The absence of known exploits in the wild suggests limited active targeting but does not eliminate future risk.

Mitigation Recommendations

1. Immediate mitigation should include restricting administrative access to OpenNMS consoles to trusted personnel and enforcing strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. 2. Implement strict input validation and output encoding on the `groupName` and `groupComment` fields within OpenNMS, either by applying vendor patches if available or by deploying web application firewalls (WAFs) with custom rules to detect and block malicious script payloads targeting these parameters. 3. Conduct regular audits of user inputs and stored data in the affected parameters to identify and remove any injected scripts. 4. Educate administrative users about the risks of interacting with untrusted inputs and encourage cautious behavior when handling group names and comments. 5. Monitor logs for unusual activity related to group management functions to detect potential exploitation attempts. 6. If vendor patches are released subsequently, prioritize their deployment in test and production environments. 7. Consider network segmentation to isolate OpenNMS management interfaces from general user networks to limit exposure. These steps go beyond generic advice by focusing on the specific vulnerable parameters and the operational context of OpenNMS deployments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Mend
Date Reserved
2021-01-22T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983ac4522896dcbed687

Added to database: 5/21/2025, 9:09:14 AM

Last enriched: 6/25/2025, 12:48:09 PM

Last updated: 2/7/2026, 8:24:54 AM

Views: 32

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats