Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10573: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Ivanti Endpoint Manager

0
Critical
VulnerabilityCVE-2025-10573cvecve-2025-10573cwe-79
Published: Tue Dec 09 2025 (12/09/2025, 15:55:23 UTC)
Source: CVE Database V5
Vendor/Project: Ivanti
Product: Endpoint Manager

Description

Stored XSS in Ivanti Endpoint Manager prior to version 2024 SU4 SR1 allows a remote unauthenticated attacker to execute arbitrary JavaScript in the context of an administrator session. User interaction is required.

AI-Powered Analysis

AILast updated: 12/16/2025, 18:53:03 UTC

Technical Analysis

CVE-2025-10573 is a stored Cross-site Scripting (XSS) vulnerability classified under CWE-79, affecting Ivanti Endpoint Manager versions prior to 2024 SU4 SR1. The flaw arises from improper neutralization of input during web page generation, allowing malicious input to be stored and later rendered in an administrator's browser context without adequate sanitization. This enables a remote, unauthenticated attacker to inject arbitrary JavaScript code that executes when an administrator views the compromised content. The attack requires user interaction, such as clicking a crafted link or viewing a manipulated interface element, but no authentication is necessary, increasing the attack surface. The vulnerability impacts confidentiality by potentially exposing sensitive administrative data, integrity by enabling unauthorized actions through script execution, and availability by possibly disrupting management functions. The CVSS v3.1 score of 9.6 reflects its critical severity, with attack vector network-based, low attack complexity, no privileges required, user interaction needed, and scope changed due to potential impact beyond the vulnerable component. Although no active exploits have been reported, the high severity and administrative context make this a significant threat. Ivanti Endpoint Manager is widely used for endpoint management, patching, and security compliance, making this vulnerability particularly concerning for organizations relying on it for centralized control.

Potential Impact

For European organizations, this vulnerability poses a severe risk to the security and stability of endpoint management infrastructure. Successful exploitation could lead to unauthorized administrative access, data leakage, and manipulation of endpoint configurations, potentially disrupting business operations. Given the critical role of Ivanti Endpoint Manager in managing large fleets of devices, attackers could leverage this vulnerability to propagate malware, exfiltrate sensitive information, or disable security controls. This is especially impactful for sectors with stringent regulatory requirements such as finance, healthcare, and government, where administrative compromise could lead to compliance violations and reputational damage. The requirement for user interaction somewhat limits automated exploitation but does not significantly reduce risk due to the high value of administrator sessions targeted. The vulnerability could also be leveraged in targeted attacks against European organizations with high-value assets or critical infrastructure, amplifying the potential damage.

Mitigation Recommendations

Organizations should immediately upgrade Ivanti Endpoint Manager to version 2024 SU4 SR1 or later, where the vulnerability is patched. Until the update is applied, administrators should minimize exposure by restricting access to the management console via network segmentation and VPNs, and by enforcing strict access controls and multi-factor authentication to reduce the risk of session hijacking. Implementing Content Security Policy (CSP) headers can help mitigate the impact of injected scripts by restricting script execution sources. Additionally, input validation and output encoding should be reviewed and enhanced to prevent malicious input from being stored or rendered. Monitoring administrative sessions for unusual activity and employing web application firewalls (WAFs) with XSS detection capabilities can provide additional layers of defense. User awareness training for administrators to recognize phishing or suspicious links can reduce the likelihood of user interaction exploitation. Regular security audits and penetration testing focused on web interface vulnerabilities are recommended to detect similar issues proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
ivanti
Date Reserved
2025-09-16T18:01:53.783Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69384a3e795dcaf6c511e71f

Added to database: 12/9/2025, 4:11:42 PM

Last enriched: 12/16/2025, 6:53:03 PM

Last updated: 2/7/2026, 11:17:31 AM

Views: 247

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats