Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24404: CWE-91 XML Injection (aka Blind XPath Injection) in Apache Software Foundation Apache HertzBeat (incubating)

0
High
VulnerabilityCVE-2025-24404cvecve-2025-24404cwe-91
Published: Tue Sep 09 2025 (09/09/2025, 09:30:59 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache HertzBeat (incubating)

Description

XML Injection RCE by parse http sitemap xml response vulnerability in Apache HertzBeat. The attacker needs to have an authenticated account with access, and add monitor parsed by xml, returned special content can trigger the XML parsing vulnerability. This issue affects Apache HertzBeat (incubating): before 1.7.0. Users are recommended to upgrade to version 1.7.0, which fixes the issue.

AI-Powered Analysis

AILast updated: 11/04/2025, 21:43:34 UTC

Technical Analysis

CVE-2025-24404 is a critical XML Injection vulnerability classified under CWE-91, affecting Apache HertzBeat (incubating) versions before 1.7.0. The flaw exists in the XML parsing logic of the HTTP sitemap response used by the monitoring feature. An attacker with an authenticated account and permissions to add monitors that parse XML can supply specially crafted XML content that triggers Blind XPath Injection. This injection allows the attacker to manipulate XPath queries used internally by the application, potentially leading to remote code execution (RCE). The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network. The root cause is insufficient input validation and sanitization of XML data before parsing. The vulnerability impacts confidentiality, integrity, and availability by allowing attackers to execute arbitrary code, potentially compromising the host system and the monitoring infrastructure. Apache has fixed this issue in version 1.7.0, and users should upgrade immediately to mitigate risk. No known exploits are currently reported in the wild, but the high CVSS score (8.8) indicates a significant threat if weaponized.

Potential Impact

For European organizations, this vulnerability poses a severe risk, especially those relying on Apache HertzBeat for monitoring critical IT infrastructure. Successful exploitation could lead to full system compromise, data breaches, and disruption of monitoring services, impacting operational continuity. Given the vulnerability requires authenticated access, insider threats or compromised credentials could facilitate exploitation. The ability to execute arbitrary code remotely could allow attackers to move laterally within networks, escalate privileges, or deploy ransomware. Organizations in sectors such as finance, energy, telecommunications, and government are particularly vulnerable due to their reliance on robust monitoring solutions. The disruption or manipulation of monitoring data could delay incident detection and response, exacerbating the impact of other attacks. Additionally, the vulnerability could be leveraged in supply chain attacks if attackers compromise monitoring infrastructure used by multiple organizations.

Mitigation Recommendations

Immediate upgrade to Apache HertzBeat version 1.7.0 or later is the primary mitigation step, as this version contains the patch for the XML Injection vulnerability. Organizations should audit and restrict access to monitoring configuration interfaces, ensuring only trusted and necessary personnel have authenticated accounts with monitor creation privileges. Implement multi-factor authentication (MFA) to reduce the risk of credential compromise. Conduct regular reviews of monitor configurations to detect any unauthorized or suspicious XML inputs. Network segmentation should be applied to isolate monitoring systems from broader enterprise networks, limiting lateral movement opportunities. Employ runtime application self-protection (RASP) or web application firewalls (WAFs) capable of detecting and blocking malicious XML payloads or XPath injection attempts. Finally, maintain vigilant monitoring and logging of authentication and configuration changes to detect potential exploitation attempts early.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
apache
Date Reserved
2025-01-21T14:41:26.279Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68bff5086e8a17a29f14d442

Added to database: 9/9/2025, 9:36:08 AM

Last enriched: 11/4/2025, 9:43:34 PM

Last updated: 12/10/2025, 11:33:35 PM

Views: 85

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats