Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-46287: n/a

0
Unknown
VulnerabilityCVE-2023-46287cvecve-2023-46287
Published: Fri Oct 20 2023 (10/20/2023, 00:00:00 UTC)
Source: CVE Database V5

Description

XSS exists in NagVis before 1.9.38 via the select function in share/server/core/functions/html.php.

AI-Powered Analysis

AILast updated: 11/03/2025, 19:52:42 UTC

Technical Analysis

CVE-2023-46287 is a security vulnerability classified as a cross-site scripting (XSS) flaw affecting NagVis, an open-source visualization tool for network and system monitoring. The vulnerability is located in the select function of the share/server/core/functions/html.php file in NagVis versions before 1.9.38. XSS vulnerabilities occur when an application includes untrusted input in web pages without proper validation or escaping, allowing attackers to inject malicious scripts that execute in users' browsers. In this case, the select function improperly handles input, enabling an attacker to craft a malicious payload that, when rendered by a victim's browser, executes arbitrary JavaScript code. Such exploitation can lead to session hijacking, theft of sensitive information, or redirection to malicious sites. The vulnerability does not require authentication, increasing its risk profile, but no known exploits have been reported in the wild as of the publication date. The absence of a CVSS score suggests the need for a severity assessment based on the impact and exploitability factors. Given the nature of XSS and the affected component, the vulnerability primarily threatens confidentiality and integrity of user sessions and data. NagVis is commonly used in network operations centers and IT monitoring environments, making the vulnerability relevant to organizations relying on this tool for infrastructure visibility. The patch for this vulnerability is included in NagVis version 1.9.38, which addresses the input handling flaw in the select function. Organizations running earlier versions should prioritize upgrading to mitigate potential risks.

Potential Impact

For European organizations, the impact of CVE-2023-46287 can be significant in environments where NagVis is deployed for monitoring critical IT infrastructure. Successful exploitation could allow attackers to execute malicious scripts in the context of legitimate users, potentially leading to session hijacking, unauthorized access to monitoring dashboards, or manipulation of displayed data. This could undermine trust in monitoring systems, delay incident response, or facilitate further attacks within the network. Although no active exploits are known, the vulnerability's presence in monitoring tools used by enterprises, service providers, and government agencies increases the risk profile. Confidentiality and integrity of monitoring data are primarily at risk, while availability impact is limited unless combined with other attack vectors. The risk is heightened in organizations with less stringent web security controls or those that allow broad access to NagVis interfaces. Given the critical role of monitoring tools in operational security, exploitation could indirectly impact business continuity and compliance with regulatory requirements such as GDPR if sensitive data is exposed or manipulated.

Mitigation Recommendations

1. Upgrade NagVis to version 1.9.38 or later immediately to apply the official patch that fixes the XSS vulnerability in the select function. 2. Implement strict input validation and output encoding on all user-supplied data within NagVis, especially in custom configurations or extensions that interact with the select function. 3. Deploy Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing NagVis dashboards. 4. Limit access to NagVis interfaces to trusted networks and authenticated users where possible, reducing the attack surface. 5. Monitor web server and application logs for suspicious input patterns or repeated attempts to exploit XSS vectors. 6. Educate users and administrators about the risks of XSS and encourage prompt reporting of unusual behavior in monitoring dashboards. 7. Consider web application firewalls (WAF) with rules targeting XSS payloads as an additional protective layer. 8. Regularly review and update NagVis and all associated components to maintain security posture.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2023-10-20T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690904ac00ff46172d4a0d2b

Added to database: 11/3/2025, 7:38:20 PM

Last enriched: 11/3/2025, 7:52:42 PM

Last updated: 11/6/2025, 11:09:06 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats