Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14340: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Payara Platform Payara Server

0
High
VulnerabilityCVE-2025-14340cvecve-2025-14340cwe-79
Published: Wed Feb 18 2026 (02/18/2026, 13:39:11 UTC)
Source: CVE Database V5
Vendor/Project: Payara Platform
Product: Payara Server

Description

Cross-site scripting in REST Management Interface in Payara Server <4.1.2.191.54, <5.83.0, <6.34.0, <7.2026.1 allows an attacker to mislead the administrator to change the admin password via URL Payload.

AI-Powered Analysis

AILast updated: 02/18/2026, 14:55:53 UTC

Technical Analysis

CVE-2025-14340 is a cross-site scripting (XSS) vulnerability identified in the REST Management Interface of Payara Server, a widely used Java EE application server platform. The vulnerability arises from improper neutralization of input during web page generation (CWE-79), allowing malicious scripts embedded in crafted URL payloads to be executed in the context of an administrator's browser session. Specifically, the flaw enables an attacker to mislead an administrator into changing the admin password by injecting malicious content into the REST interface responses. The affected versions include multiple releases before 4.1.2.191.54, 5.83.0, 6.34.0, and 7.2026.1, indicating a broad range of impacted deployments. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:H but with user interaction UI:A), and high impact on confidentiality, integrity, and availability (C:H, I:H, A:H). The vulnerability requires user interaction, meaning the administrator must be tricked into clicking or visiting a malicious URL. No known public exploits have been reported yet, but the potential for administrative credential compromise and subsequent full control over the server makes this a critical concern. The vulnerability affects the REST Management Interface, which is often exposed internally or externally for administrative tasks, increasing the risk if access controls are insufficient. The root cause is the failure to properly sanitize or encode user-supplied input before rendering it in the web interface, allowing script injection and execution.

Potential Impact

For European organizations, this vulnerability poses a serious risk to the security of Payara Server deployments, especially those exposing the REST Management Interface to internal networks or the internet. Successful exploitation can lead to unauthorized administrative password changes, resulting in full compromise of the server and potentially the applications it hosts. This can cause data breaches, service disruption, and unauthorized access to sensitive business logic or customer data. Organizations in sectors such as finance, government, healthcare, and critical infrastructure that rely on Payara Server for enterprise applications are particularly vulnerable. The impact extends beyond confidentiality to integrity and availability, as attackers gaining admin access can manipulate configurations, deploy malicious code, or disrupt services. The requirement for user interaction means phishing or social engineering attacks targeting administrators are likely attack vectors. Given the high CVSS score and the administrative nature of the vulnerability, the potential operational and reputational damage is significant.

Mitigation Recommendations

European organizations should immediately assess their Payara Server versions and upgrade to the patched versions 4.1.2.191.54, 5.83.0, 6.34.0, or 7.2026.1 or later. If immediate patching is not feasible, restrict access to the REST Management Interface using network segmentation, firewall rules, and VPNs to limit exposure only to trusted administrators. Implement multi-factor authentication (MFA) for administrative access to reduce the risk of credential misuse. Educate administrators about phishing and social engineering risks, emphasizing caution when clicking on URLs related to management interfaces. Enable logging and monitoring of REST interface access to detect suspicious activities. Consider deploying web application firewalls (WAFs) with custom rules to detect and block XSS payloads targeting the management interface. Regularly review and audit administrative accounts and password policies to ensure strong, unique credentials. Finally, conduct penetration testing and vulnerability scanning focused on management interfaces to identify and remediate similar issues proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Payara
Date Reserved
2025-12-09T14:07:13.242Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6995cf916aea4a407abb58d8

Added to database: 2/18/2026, 2:41:21 PM

Last enriched: 2/18/2026, 2:55:53 PM

Last updated: 2/21/2026, 2:19:20 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats