Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34260: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Advantech Co., Ltd. WISE-DeviceOn Server

0
Medium
VulnerabilityCVE-2025-34260cvecve-2025-34260cwe-79
Published: Fri Dec 05 2025 (12/05/2025, 17:15:44 UTC)
Source: CVE Database V5
Vendor/Project: Advantech Co., Ltd.
Product: WISE-DeviceOn Server

Description

Advantech WISE-DeviceOn Server versions prior to 5.4 contain a stored cross-site scripting (XSS) vulnerability in the /rmm/v1/action/schedule endpoint. When an authenticated user adds a schedule to an existing task, the schedule name is stored and later rendered in schedule listings without HTML sanitation. An attacker can inject malicious script into the schedule name, which is then executed in the browser context of users who view or interact with the affected schedule, potentially enabling session compromise and unauthorized actions as the victim.

AI-Powered Analysis

AILast updated: 12/19/2025, 18:37:21 UTC

Technical Analysis

CVE-2025-34260 is a stored cross-site scripting (XSS) vulnerability identified in Advantech Co., Ltd.'s WISE-DeviceOn Server, affecting versions prior to 5.4. The vulnerability exists in the /rmm/v1/action/schedule endpoint, where authenticated users can add schedules to existing tasks. The schedule name input is stored without proper HTML sanitization and later rendered in schedule listings. This improper neutralization of input (CWE-79) allows an attacker to inject malicious JavaScript code into the schedule name. When other users view or interact with the schedule listing, the injected script executes in their browser context. This can lead to session hijacking, unauthorized actions performed with the victim's privileges, or other malicious activities within the web application context. The vulnerability requires the attacker to have authenticated access to the system and relies on user interaction to trigger the payload execution. The CVSS 4.0 base score is 5.1, indicating a medium severity with network attack vector, low attack complexity, no privileges required beyond authentication, and user interaction needed. The vulnerability has not been reported as exploited in the wild yet. The lack of available patches at the time of reporting necessitates immediate mitigation through input validation and output encoding. This vulnerability poses a risk to environments where WISE-DeviceOn Server is used for industrial device management and monitoring, potentially impacting operational technology (OT) environments.

Potential Impact

For European organizations, this vulnerability presents a moderate risk primarily to industrial and manufacturing sectors that rely on Advantech's WISE-DeviceOn Server for device management and monitoring. Successful exploitation could lead to session hijacking, unauthorized command execution, and potential disruption of device management workflows. This could compromise the integrity and availability of industrial control systems, leading to operational downtime or safety risks. Confidentiality could also be impacted if session tokens or sensitive information are stolen via the XSS attack. Given the requirement for authenticated access and user interaction, the attack surface is somewhat limited but still significant in environments with multiple users managing devices. The impact is heightened in critical infrastructure sectors where device management systems are integral to operational continuity. Additionally, the vulnerability could be leveraged as a foothold for further lateral movement within the network, increasing the overall risk posture.

Mitigation Recommendations

1. Upgrade: Apply the latest available patches or upgrade to Advantech WISE-DeviceOn Server version 5.4 or later once released. 2. Input Validation: Implement strict server-side input validation to reject or sanitize schedule names containing HTML or script elements before storage. 3. Output Encoding: Ensure that all user-supplied data rendered in the UI is properly encoded/escaped to prevent script execution. 4. Access Controls: Restrict schedule creation and modification privileges to trusted users only, minimizing the number of accounts that can inject malicious input. 5. Monitoring and Logging: Enable detailed logging of schedule creation/modification activities and monitor for suspicious inputs or anomalous user behavior. 6. User Awareness: Educate users about the risks of interacting with untrusted schedule entries and encourage cautious behavior. 7. Web Application Firewall (WAF): Deploy or tune WAF rules to detect and block common XSS payloads targeting the affected endpoint. 8. Session Management: Implement secure cookie attributes (HttpOnly, Secure, SameSite) to reduce session hijacking risks if XSS occurs. 9. Network Segmentation: Isolate device management systems from general IT networks to limit lateral movement in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.578Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693316aef88dbe026cfdbe11

Added to database: 12/5/2025, 5:30:22 PM

Last enriched: 12/19/2025, 6:37:21 PM

Last updated: 2/4/2026, 4:49:51 AM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats