CVE-2025-10573: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Ivanti Endpoint Manager
Stored XSS in Ivanti Endpoint Manager prior to version 2024 SU4 SR1 allows a remote unauthenticated attacker to execute arbitrary JavaScript in the context of an administrator session. User interaction is required.
AI Analysis
Technical Summary
CVE-2025-10573 is a stored Cross-site Scripting (XSS) vulnerability classified under CWE-79, affecting Ivanti Endpoint Manager versions prior to 2024 SU4 SR1. The flaw arises from improper neutralization of input during web page generation, allowing malicious input to be stored and later rendered in an administrator's browser context without adequate sanitization. This enables a remote, unauthenticated attacker to inject arbitrary JavaScript code that executes when an administrator views the compromised content. The attack requires user interaction, such as clicking a crafted link or viewing a manipulated interface element, but no authentication is necessary, increasing the attack surface. The vulnerability impacts confidentiality by potentially exposing sensitive administrative data, integrity by enabling unauthorized actions through script execution, and availability by possibly disrupting management functions. The CVSS v3.1 score of 9.6 reflects its critical severity, with attack vector network-based, low attack complexity, no privileges required, user interaction needed, and scope changed due to potential impact beyond the vulnerable component. Although no active exploits have been reported, the high severity and administrative context make this a significant threat. Ivanti Endpoint Manager is widely used for endpoint management, patching, and security compliance, making this vulnerability particularly concerning for organizations relying on it for centralized control.
Potential Impact
For European organizations, this vulnerability poses a severe risk to the security and stability of endpoint management infrastructure. Successful exploitation could lead to unauthorized administrative access, data leakage, and manipulation of endpoint configurations, potentially disrupting business operations. Given the critical role of Ivanti Endpoint Manager in managing large fleets of devices, attackers could leverage this vulnerability to propagate malware, exfiltrate sensitive information, or disable security controls. This is especially impactful for sectors with stringent regulatory requirements such as finance, healthcare, and government, where administrative compromise could lead to compliance violations and reputational damage. The requirement for user interaction somewhat limits automated exploitation but does not significantly reduce risk due to the high value of administrator sessions targeted. The vulnerability could also be leveraged in targeted attacks against European organizations with high-value assets or critical infrastructure, amplifying the potential damage.
Mitigation Recommendations
Organizations should immediately upgrade Ivanti Endpoint Manager to version 2024 SU4 SR1 or later, where the vulnerability is patched. Until the update is applied, administrators should minimize exposure by restricting access to the management console via network segmentation and VPNs, and by enforcing strict access controls and multi-factor authentication to reduce the risk of session hijacking. Implementing Content Security Policy (CSP) headers can help mitigate the impact of injected scripts by restricting script execution sources. Additionally, input validation and output encoding should be reviewed and enhanced to prevent malicious input from being stored or rendered. Monitoring administrative sessions for unusual activity and employing web application firewalls (WAFs) with XSS detection capabilities can provide additional layers of defense. User awareness training for administrators to recognize phishing or suspicious links can reduce the likelihood of user interaction exploitation. Regular security audits and penetration testing focused on web interface vulnerabilities are recommended to detect similar issues proactively.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Ireland
CVE-2025-10573: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Ivanti Endpoint Manager
Description
Stored XSS in Ivanti Endpoint Manager prior to version 2024 SU4 SR1 allows a remote unauthenticated attacker to execute arbitrary JavaScript in the context of an administrator session. User interaction is required.
AI-Powered Analysis
Technical Analysis
CVE-2025-10573 is a stored Cross-site Scripting (XSS) vulnerability classified under CWE-79, affecting Ivanti Endpoint Manager versions prior to 2024 SU4 SR1. The flaw arises from improper neutralization of input during web page generation, allowing malicious input to be stored and later rendered in an administrator's browser context without adequate sanitization. This enables a remote, unauthenticated attacker to inject arbitrary JavaScript code that executes when an administrator views the compromised content. The attack requires user interaction, such as clicking a crafted link or viewing a manipulated interface element, but no authentication is necessary, increasing the attack surface. The vulnerability impacts confidentiality by potentially exposing sensitive administrative data, integrity by enabling unauthorized actions through script execution, and availability by possibly disrupting management functions. The CVSS v3.1 score of 9.6 reflects its critical severity, with attack vector network-based, low attack complexity, no privileges required, user interaction needed, and scope changed due to potential impact beyond the vulnerable component. Although no active exploits have been reported, the high severity and administrative context make this a significant threat. Ivanti Endpoint Manager is widely used for endpoint management, patching, and security compliance, making this vulnerability particularly concerning for organizations relying on it for centralized control.
Potential Impact
For European organizations, this vulnerability poses a severe risk to the security and stability of endpoint management infrastructure. Successful exploitation could lead to unauthorized administrative access, data leakage, and manipulation of endpoint configurations, potentially disrupting business operations. Given the critical role of Ivanti Endpoint Manager in managing large fleets of devices, attackers could leverage this vulnerability to propagate malware, exfiltrate sensitive information, or disable security controls. This is especially impactful for sectors with stringent regulatory requirements such as finance, healthcare, and government, where administrative compromise could lead to compliance violations and reputational damage. The requirement for user interaction somewhat limits automated exploitation but does not significantly reduce risk due to the high value of administrator sessions targeted. The vulnerability could also be leveraged in targeted attacks against European organizations with high-value assets or critical infrastructure, amplifying the potential damage.
Mitigation Recommendations
Organizations should immediately upgrade Ivanti Endpoint Manager to version 2024 SU4 SR1 or later, where the vulnerability is patched. Until the update is applied, administrators should minimize exposure by restricting access to the management console via network segmentation and VPNs, and by enforcing strict access controls and multi-factor authentication to reduce the risk of session hijacking. Implementing Content Security Policy (CSP) headers can help mitigate the impact of injected scripts by restricting script execution sources. Additionally, input validation and output encoding should be reviewed and enhanced to prevent malicious input from being stored or rendered. Monitoring administrative sessions for unusual activity and employing web application firewalls (WAFs) with XSS detection capabilities can provide additional layers of defense. User awareness training for administrators to recognize phishing or suspicious links can reduce the likelihood of user interaction exploitation. Regular security audits and penetration testing focused on web interface vulnerabilities are recommended to detect similar issues proactively.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- ivanti
- Date Reserved
- 2025-09-16T18:01:53.783Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69384a3e795dcaf6c511e71f
Added to database: 12/9/2025, 4:11:42 PM
Last enriched: 12/16/2025, 6:53:03 PM
Last updated: 2/7/2026, 11:17:31 AM
Views: 247
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.