Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-23366: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

0
Medium
VulnerabilityCVE-2025-23366cvecve-2025-23366
Published: Tue Jan 14 2025 (01/14/2025, 17:41:43 UTC)
Source: CVE Database V5

Description

A flaw was found in the HAL Console in the Wildfly component, which does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output used as a web page that is served to other users. The attacker must be authenticated as a user that belongs to management groups “SuperUser”, “Admin”, or “Maintainer”.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 12:36:07 UTC

Technical Analysis

CVE-2025-23366 is a medium-severity cross-site scripting (XSS) vulnerability identified in the HAL Console component of the Wildfly application server. The flaw stems from improper or missing neutralization of user-supplied input before it is embedded into web pages served to other users. This vulnerability specifically affects users authenticated with high-level management roles such as SuperUser, Admin, or Maintainer, meaning that exploitation requires prior authentication and elevated privileges. When exploited, an attacker can inject malicious scripts that execute in the browsers of other authorized users accessing the HAL Console, potentially leading to theft of sensitive information, session tokens, or unauthorized actions performed on behalf of the victim. The vulnerability has a CVSS 3.1 base score of 6.5, reflecting a network attack vector with low attack complexity but requiring high privileges and no user interaction. The flaw does not impact availability but compromises confidentiality and integrity. No public exploits have been reported yet, and no patches are linked, indicating that remediation may still be pending or in progress. Given the critical nature of management consoles in enterprise environments, this vulnerability poses a significant risk if left unaddressed.

Potential Impact

The primary impact of CVE-2025-23366 is the potential compromise of confidentiality and integrity within enterprise environments using Wildfly's HAL Console. Successful exploitation allows attackers with management-level access to execute arbitrary scripts in other administrators' browsers, which can lead to session hijacking, credential theft, or unauthorized administrative actions. This can result in unauthorized access to sensitive configuration data, disruption of management operations, and potential lateral movement within the network. Although exploitation requires authenticated access with elevated privileges, insider threats or compromised credentials could be leveraged to exploit this vulnerability. The absence of user interaction lowers the barrier for automated exploitation once an attacker has access. Organizations relying on Wildfly for critical middleware services, especially those with multiple administrators, are at risk of internal compromise and data leakage. The vulnerability does not affect system availability directly but can facilitate further attacks that might.

Mitigation Recommendations

To mitigate CVE-2025-23366, organizations should immediately restrict access to the HAL Console to trusted administrators only, enforcing strict role-based access controls and multi-factor authentication to reduce the risk of credential compromise. Monitor and audit management console access logs for suspicious activity. Apply any available patches or updates from Wildfly or Red Hat as soon as they are released. If patches are not yet available, consider temporarily disabling or limiting the use of the HAL Console or isolating it within a secure network segment. Implement Content Security Policy (CSP) headers to reduce the impact of potential XSS exploits. Educate administrators on phishing and social engineering risks to prevent credential theft. Regularly review and sanitize user inputs in custom extensions or integrations with the HAL Console. Finally, maintain up-to-date backups and incident response plans to quickly respond to any exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-01-14T15:23:42.645Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68b38a1cad5a09ad0096159f

Added to database: 8/30/2025, 11:32:44 PM

Last enriched: 2/27/2026, 12:36:07 PM

Last updated: 3/22/2026, 5:08:31 PM

Views: 160

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses