Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-26391: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in SolarWinds SolarWinds Observability Self-Hosted

0
Medium
VulnerabilityCVE-2025-26391cvecve-2025-26391cwe-79
Published: Tue Nov 18 2025 (11/18/2025, 08:53:01 UTC)
Source: CVE Database V5
Vendor/Project: SolarWinds
Product: SolarWinds Observability Self-Hosted

Description

SolarWinds Observability Self-Hosted XSS Vulnerability. The SolarWinds Platform was susceptible to a XSS vulnerability that affects user-created URL fields. This vulnerability requires authentication from a low-level account.

AI-Powered Analysis

AILast updated: 11/25/2025, 09:47:47 UTC

Technical Analysis

CVE-2025-26391 is a cross-site scripting (XSS) vulnerability classified under CWE-79, affecting SolarWinds Observability Self-Hosted versions 2025.4 and earlier. The vulnerability stems from improper neutralization of user input during web page generation, specifically in user-created URL fields. An authenticated user with low-level privileges can inject malicious JavaScript code that executes in the context of other users' browsers when they view the affected pages. This can lead to unauthorized actions such as session hijacking, theft of sensitive information, or manipulation of the web interface. The vulnerability requires authentication but no user interaction beyond visiting the maliciously crafted page. The CVSS 3.1 base score is 5.4, reflecting a medium severity due to the need for authentication and limited impact on availability. The scope is 'changed' indicating that the vulnerability affects components beyond the initially vulnerable module. No known exploits have been reported in the wild, and no official patches have been published as of the vulnerability disclosure date. SolarWinds Observability is widely used for infrastructure and application monitoring, making this vulnerability significant for organizations relying on it for operational visibility. Attackers exploiting this flaw could compromise the confidentiality and integrity of monitoring data and potentially escalate privileges or move laterally within the network by leveraging stolen session tokens or credentials.

Potential Impact

For European organizations, the impact of CVE-2025-26391 can be significant, particularly for those in critical infrastructure, finance, telecommunications, and government sectors that rely heavily on SolarWinds Observability Self-Hosted for monitoring and operational insights. Exploitation could lead to unauthorized access to sensitive monitoring dashboards, exposure of internal network information, and potential manipulation of monitoring data, which could hinder incident detection and response. The confidentiality breach could facilitate further attacks such as lateral movement or privilege escalation. Although availability is not directly impacted, the integrity and confidentiality risks can disrupt trust in monitoring systems and delay response to real threats. Organizations with multi-tenant environments or shared monitoring platforms are at higher risk of cross-user attacks. The requirement for low-level authentication reduces the attack surface but does not eliminate risk, especially if low-privilege accounts are widely distributed or poorly managed.

Mitigation Recommendations

1. Restrict and review user permissions to ensure that only trusted users have access to create or modify URL fields or other input vectors. 2. Implement strict input validation and sanitization on all user-generated content, particularly URL fields, to neutralize potentially malicious scripts. 3. Monitor logs and user activity for unusual behavior indicative of exploitation attempts, such as unexpected script injections or anomalous session activity. 4. Employ web application firewalls (WAFs) with rules tuned to detect and block XSS payloads targeting SolarWinds Observability interfaces. 5. Isolate monitoring platforms from general user networks to limit exposure. 6. Prepare for patch deployment by tracking SolarWinds advisories and testing updates in controlled environments. 7. Educate users about the risks of XSS and encourage reporting of suspicious interface behavior. 8. Consider multi-factor authentication to reduce risk from compromised low-level credentials. 9. Conduct regular security assessments and penetration tests focusing on input validation and user privilege management within the SolarWinds environment.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
SolarWinds
Date Reserved
2025-02-08T00:19:09.394Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691c376d35a0ab0a562ec55c

Added to database: 11/18/2025, 9:07:57 AM

Last enriched: 11/25/2025, 9:47:47 AM

Last updated: 1/7/2026, 4:53:12 AM

Views: 64

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats