Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34259: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Advantech Co., Ltd. WISE-DeviceOn Server

0
Medium
VulnerabilityCVE-2025-34259cvecve-2025-34259cwe-79
Published: Fri Dec 05 2025 (12/05/2025, 17:16:20 UTC)
Source: CVE Database V5
Vendor/Project: Advantech Co., Ltd.
Product: WISE-DeviceOn Server

Description

Advantech WISE-DeviceOn Server versions prior to 5.4 contain a stored cross-site scripting (XSS) vulnerability in the /rmm/v1/devicemap/building endpoint. When an authenticated user creates a map entry, the name parameter is stored and later rendered in the map list UI without HTML sanitzation. An attacker can inject malicious script into the map entry name, which is then executed in the browser context of users who view or interact with the affected map entry, potentially enabling session compromise and unauthorized actions as the victim.

AI-Powered Analysis

AILast updated: 12/19/2025, 18:37:07 UTC

Technical Analysis

CVE-2025-34259 is a stored cross-site scripting vulnerability identified in Advantech Co., Ltd.'s WISE-DeviceOn Server, affecting versions prior to 5.4. The flaw exists in the /rmm/v1/devicemap/building API endpoint, where authenticated users can create map entries with a 'name' parameter that is stored and later rendered in the user interface without proper HTML sanitization or encoding. This improper neutralization of input (CWE-79) allows malicious scripts injected into the 'name' field to execute in the context of other users' browsers who access the map list UI. Exploitation could lead to session token theft, enabling attackers to perform unauthorized actions on behalf of victims, such as changing device configurations or accessing sensitive information. The vulnerability requires the attacker to have authenticated access to the system and relies on victim users interacting with the malicious map entry. The CVSS 4.0 base score is 5.1, reflecting medium severity due to network attack vector, low complexity, no privileges required beyond authentication, and user interaction needed. No public exploits have been reported yet, but the vulnerability poses a risk to environments managing industrial devices via WISE-DeviceOn Server. The lack of available patches at the time of reporting necessitates immediate mitigation efforts.

Potential Impact

For European organizations, especially those in manufacturing, industrial automation, and critical infrastructure sectors that utilize Advantech WISE-DeviceOn Server for device management, this vulnerability could lead to significant operational disruptions. Successful exploitation may allow attackers to hijack user sessions, escalate privileges, and perform unauthorized actions such as altering device configurations or extracting sensitive operational data. This could compromise the integrity and availability of industrial control systems, potentially leading to production downtime or safety hazards. Additionally, the breach of user credentials or session tokens could facilitate lateral movement within networks, increasing the risk of broader compromise. Given the reliance on IoT and device management platforms in European industries, the vulnerability poses a tangible threat to operational technology environments and associated supply chains.

Mitigation Recommendations

Organizations should immediately restrict access to the WISE-DeviceOn Server interface to trusted personnel and networks, employing network segmentation and strict access controls. Since no official patches are available yet, administrators should implement input validation and output encoding at the application or proxy level to sanitize user-supplied data, particularly the 'name' parameter in map entries. Employing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious script payloads can reduce exploitation risk. Monitoring logs for unusual map entry creations or modifications and user activity anomalies is critical for early detection. Additionally, enforcing multi-factor authentication (MFA) for all users can mitigate session hijacking impacts. Organizations should maintain up-to-date backups of configuration data and prepare incident response plans tailored to potential device management compromises. Once patches are released by Advantech, prompt application is essential to fully remediate the vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.578Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693316aef88dbe026cfdbe0c

Added to database: 12/5/2025, 5:30:22 PM

Last enriched: 12/19/2025, 6:37:07 PM

Last updated: 2/4/2026, 3:10:51 PM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats