CVE-2025-12513: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Centreon Infra Monitoring
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Centreon Infra Monitoring (Hosts configuration form modules) allows Stored XSS to users with high privileges. This issue affects Infra Monitoring: from 25.10.0 before 25.10.2, from 24.10.0 before 24.10.15, from 24.04.0 before 24.04.19.
AI Analysis
Technical Summary
CVE-2025-12513 is a stored Cross-site Scripting (XSS) vulnerability classified under CWE-79 affecting Centreon Infra Monitoring software, specifically within the Hosts configuration form modules. This vulnerability arises from improper neutralization of input during web page generation, allowing malicious script injection that is persistently stored on the server. When a high-privileged user inputs crafted data into the Hosts configuration forms, the malicious script is saved and later executed in the browsers of other users who view the affected pages. The flaw affects Centreon Infra Monitoring versions from 25.10.0 before 25.10.2, 24.10.0 before 24.10.15, and 24.04.0 before 24.04.19. Exploitation requires authenticated access with high privileges but does not require further user interaction, increasing the risk within trusted administrative environments. The vulnerability can lead to the theft of session cookies, enabling attackers to impersonate legitimate users or access sensitive monitoring data, compromising confidentiality. The CVSS v3.1 base score is 6.8, indicating a medium severity level with network attack vector, low attack complexity, high privileges required, no user interaction, and a scope change. No public exploits have been reported yet, but the vulnerability poses a significant risk to organizations relying on Centreon Infra Monitoring for critical infrastructure monitoring and management.
Potential Impact
For European organizations, the impact of CVE-2025-12513 can be significant, especially for those using Centreon Infra Monitoring to oversee critical IT infrastructure, industrial control systems, or network operations centers. Successful exploitation could allow attackers to steal session tokens or sensitive configuration data, potentially leading to unauthorized access or lateral movement within the network. This compromises the confidentiality of monitoring data, which may include sensitive operational details or security alerts. Although the vulnerability does not directly affect system integrity or availability, the breach of confidentiality can facilitate further attacks or espionage. Given that exploitation requires high privileges, the threat is primarily to organizations with insufficient internal access controls or where administrative credentials are not tightly managed. European sectors such as energy, telecommunications, finance, and government agencies that rely on Centreon for infrastructure monitoring are at heightened risk. The absence of known exploits reduces immediate risk but does not eliminate the potential for targeted attacks or future exploit development.
Mitigation Recommendations
To mitigate CVE-2025-12513, European organizations should immediately upgrade Centreon Infra Monitoring to versions 25.10.2, 24.10.15, or 24.04.19 or later where the vulnerability is patched. If immediate patching is not feasible, restrict access to the Hosts configuration forms to only the most trusted administrators and implement strict role-based access controls to limit high privilege accounts. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious input patterns targeting the Hosts configuration forms. Conduct regular audits of user inputs and logs for signs of attempted XSS injection. Additionally, enforce secure coding practices and input validation on any custom plugins or integrations with Centreon. Educate administrators about the risks of stored XSS and the importance of cautious input handling. Finally, monitor Centreon Infra Monitoring instances for unusual activity that may indicate exploitation attempts.
Affected Countries
France, Germany, United Kingdom, Netherlands, Italy, Spain, Belgium
CVE-2025-12513: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Centreon Infra Monitoring
Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Centreon Infra Monitoring (Hosts configuration form modules) allows Stored XSS to users with high privileges. This issue affects Infra Monitoring: from 25.10.0 before 25.10.2, from 24.10.0 before 24.10.15, from 24.04.0 before 24.04.19.
AI-Powered Analysis
Technical Analysis
CVE-2025-12513 is a stored Cross-site Scripting (XSS) vulnerability classified under CWE-79 affecting Centreon Infra Monitoring software, specifically within the Hosts configuration form modules. This vulnerability arises from improper neutralization of input during web page generation, allowing malicious script injection that is persistently stored on the server. When a high-privileged user inputs crafted data into the Hosts configuration forms, the malicious script is saved and later executed in the browsers of other users who view the affected pages. The flaw affects Centreon Infra Monitoring versions from 25.10.0 before 25.10.2, 24.10.0 before 24.10.15, and 24.04.0 before 24.04.19. Exploitation requires authenticated access with high privileges but does not require further user interaction, increasing the risk within trusted administrative environments. The vulnerability can lead to the theft of session cookies, enabling attackers to impersonate legitimate users or access sensitive monitoring data, compromising confidentiality. The CVSS v3.1 base score is 6.8, indicating a medium severity level with network attack vector, low attack complexity, high privileges required, no user interaction, and a scope change. No public exploits have been reported yet, but the vulnerability poses a significant risk to organizations relying on Centreon Infra Monitoring for critical infrastructure monitoring and management.
Potential Impact
For European organizations, the impact of CVE-2025-12513 can be significant, especially for those using Centreon Infra Monitoring to oversee critical IT infrastructure, industrial control systems, or network operations centers. Successful exploitation could allow attackers to steal session tokens or sensitive configuration data, potentially leading to unauthorized access or lateral movement within the network. This compromises the confidentiality of monitoring data, which may include sensitive operational details or security alerts. Although the vulnerability does not directly affect system integrity or availability, the breach of confidentiality can facilitate further attacks or espionage. Given that exploitation requires high privileges, the threat is primarily to organizations with insufficient internal access controls or where administrative credentials are not tightly managed. European sectors such as energy, telecommunications, finance, and government agencies that rely on Centreon for infrastructure monitoring are at heightened risk. The absence of known exploits reduces immediate risk but does not eliminate the potential for targeted attacks or future exploit development.
Mitigation Recommendations
To mitigate CVE-2025-12513, European organizations should immediately upgrade Centreon Infra Monitoring to versions 25.10.2, 24.10.15, or 24.04.19 or later where the vulnerability is patched. If immediate patching is not feasible, restrict access to the Hosts configuration forms to only the most trusted administrators and implement strict role-based access controls to limit high privilege accounts. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious input patterns targeting the Hosts configuration forms. Conduct regular audits of user inputs and logs for signs of attempted XSS injection. Additionally, enforce secure coding practices and input validation on any custom plugins or integrations with Centreon. Educate administrators about the risks of stored XSS and the importance of cautious input handling. Finally, monitor Centreon Infra Monitoring instances for unusual activity that may indicate exploitation attempts.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Centreon
- Date Reserved
- 2025-10-30T15:18:36.025Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 695bc49d3dc84013b27640fa
Added to database: 1/5/2026, 2:03:09 PM
Last enriched: 1/5/2026, 2:17:50 PM
Last updated: 1/7/2026, 8:44:42 AM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15158: CWE-434 Unrestricted Upload of File with Dangerous Type in eastsidecode WP Enable WebP
HighCVE-2025-15018: CWE-639 Authorization Bypass Through User-Controlled Key in djanym Optional Email
CriticalCVE-2025-15000: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tfrommen Page Keys
MediumCVE-2025-14999: CWE-352 Cross-Site Request Forgery (CSRF) in kentothemes Latest Tabs
MediumCVE-2025-13531: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hayyatapps Stylish Order Form Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.