Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34259: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Advantech Co., Ltd. WISE-DeviceOn Server

0
Medium
VulnerabilityCVE-2025-34259cvecve-2025-34259cwe-79
Published: Fri Dec 05 2025 (12/05/2025, 17:16:20 UTC)
Source: CVE Database V5
Vendor/Project: Advantech Co., Ltd.
Product: WISE-DeviceOn Server

Description

Advantech WISE-DeviceOn Server versions prior to 5.4 contain a stored cross-site scripting (XSS) vulnerability in the /rmm/v1/devicemap/building endpoint. When an authenticated user creates a map entry, the name parameter is stored and later rendered in the map list UI without HTML sanitzation. An attacker can inject malicious script into the map entry name, which is then executed in the browser context of users who view or interact with the affected map entry, potentially enabling session compromise and unauthorized actions as the victim.

AI-Powered Analysis

AILast updated: 12/05/2025, 17:48:17 UTC

Technical Analysis

CVE-2025-34259 is a stored cross-site scripting (XSS) vulnerability identified in Advantech Co., Ltd.'s WISE-DeviceOn Server, specifically affecting versions prior to 5.4. The vulnerability resides in the /rmm/v1/devicemap/building REST API endpoint, which allows authenticated users to create map entries with a 'name' parameter. This parameter is stored in the backend and later rendered in the map list user interface without proper HTML sanitization or encoding. As a result, an attacker with valid credentials can inject malicious JavaScript code into the 'name' field. When other users view or interact with the compromised map entry, the injected script executes within their browser context, potentially enabling session hijacking, theft of authentication tokens, or unauthorized actions performed with the victim's privileges. The vulnerability requires the attacker to have at least authenticated access to the system and relies on user interaction to trigger the malicious payload. The CVSS v4.0 base score is 5.1, reflecting medium severity, with network attack vector, low complexity, no privileges required beyond authentication, and user interaction needed. No public exploits or active exploitation have been reported to date. The vulnerability stems from improper neutralization of input during web page generation, categorized under CWE-79. Given the nature of WISE-DeviceOn Server as an industrial IoT device management platform, exploitation could lead to broader operational impacts if attackers leverage compromised sessions to manipulate device configurations or data.

Potential Impact

For European organizations, especially those in industrial sectors utilizing Advantech WISE-DeviceOn Server for IoT device management, this vulnerability poses a risk of unauthorized access and control over critical infrastructure components. Successful exploitation could lead to session hijacking, enabling attackers to perform unauthorized actions such as altering device configurations, disrupting monitoring capabilities, or exfiltrating sensitive operational data. This could impact the confidentiality, integrity, and availability of industrial control systems and associated services. The medium severity score indicates moderate risk, but the operational context elevates potential consequences, particularly in sectors like manufacturing, energy, and transportation where Advantech products are commonly deployed. Additionally, the requirement for authentication limits exposure to internal or credentialed users, but insider threats or compromised accounts could be leveraged. The lack of known exploits reduces immediate risk but does not eliminate the threat, underscoring the need for proactive mitigation. The vulnerability could also facilitate lateral movement within networks if attackers gain footholds via XSS-induced session compromise.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Upgrade Advantech WISE-DeviceOn Server to version 5.4 or later where the vulnerability is patched. 2) If immediate patching is not feasible, restrict access to the /rmm/v1/devicemap/building endpoint to trusted administrators and limit authenticated user privileges to minimize injection opportunities. 3) Implement web application firewalls (WAFs) with custom rules to detect and block suspicious script injection patterns in HTTP requests targeting the map entry name parameter. 4) Conduct regular security awareness training emphasizing the risks of XSS and the importance of cautious interaction with user-generated content within the platform. 5) Monitor logs for unusual activities related to map entry creation or modification and anomalous user behavior indicative of exploitation attempts. 6) Employ Content Security Policy (CSP) headers on the WISE-DeviceOn Server web interface to restrict execution of unauthorized scripts. 7) Enforce strong authentication mechanisms and session management controls to reduce the impact of session hijacking. 8) Perform periodic security assessments and code reviews focusing on input validation and output encoding practices within custom integrations or extensions of the platform.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.578Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693316aef88dbe026cfdbe0c

Added to database: 12/5/2025, 5:30:22 PM

Last enriched: 12/5/2025, 5:48:17 PM

Last updated: 12/11/2025, 4:30:24 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats