Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34262: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Advantech Co., Ltd. WISE-DeviceOn Server

0
Medium
VulnerabilityCVE-2025-34262cvecve-2025-34262cwe-79
Published: Fri Dec 05 2025 (12/05/2025, 17:16:55 UTC)
Source: CVE Database V5
Vendor/Project: Advantech Co., Ltd.
Product: WISE-DeviceOn Server

Description

Advantech WISE-DeviceOn Server versions prior to 5.4 contain a stored cross-site scripting (XSS) vulnerability in the /rmm/v1/devices/name/{agent_id} endpoint. When an authenticated user renames a device, the new_name value is stored and later rendered in device listings or detail views without proper HTML sanitation. An attacker can inject malicious script into the device name, which is then executed in the browser context of users who view or interact with the affected device, potentially enabling session compromise and unauthorized actions as the victim.

AI-Powered Analysis

AILast updated: 12/19/2025, 18:37:48 UTC

Technical Analysis

CVE-2025-34262 is a stored cross-site scripting (XSS) vulnerability identified in Advantech Co., Ltd.'s WISE-DeviceOn Server, specifically affecting versions prior to 5.4. The vulnerability resides in the /rmm/v1/devices/name/{agent_id} REST API endpoint, which allows authenticated users to rename devices managed by the server. When a device is renamed, the new_name parameter is stored in the backend database and later rendered in device listings or detail views within the web interface. However, the application fails to properly sanitize or neutralize HTML or script content in the new_name value before rendering it in the browser. This improper input handling corresponds to CWE-79, which is a common web application security weakness involving cross-site scripting. An attacker with valid credentials can exploit this by injecting malicious JavaScript code into the device name. When other users, including administrators or operators, view the affected device's information, the malicious script executes in their browser context. This can lead to session cookie theft, unauthorized actions performed on behalf of the victim user, or other browser-based attacks. The vulnerability requires the attacker to have authenticated access to the system and some level of user interaction (viewing the device page) to trigger the exploit. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required beyond authentication, and user interaction needed. The impact on confidentiality and integrity is low to limited, but it can facilitate session compromise and unauthorized actions. No public exploits or active exploitation have been reported to date. The vulnerability affects all versions prior to 5.4, and no official patches or mitigation links were provided in the source information. Organizations using WISE-DeviceOn Server should be aware of this vulnerability and take steps to remediate or mitigate it.

Potential Impact

For European organizations, this vulnerability poses a moderate risk, especially for those relying on Advantech WISE-DeviceOn Server for industrial IoT device management and monitoring. Exploitation could allow attackers to hijack sessions of legitimate users, potentially leading to unauthorized control or manipulation of IoT devices, disruption of operational technology environments, or leakage of sensitive operational data. Given the critical role of IoT and industrial automation in sectors such as manufacturing, energy, and transportation across Europe, successful exploitation could impact operational integrity and availability. While the vulnerability requires authenticated access, insider threats or compromised credentials could facilitate attacks. The lack of known exploits reduces immediate risk, but the stored nature of the XSS means that once injected, multiple users could be affected over time. This could undermine trust in device management platforms and lead to compliance issues under GDPR if personal or sensitive data is exposed or manipulated. The medium severity rating reflects these considerations, emphasizing the need for timely remediation to avoid escalation or chaining with other vulnerabilities.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Upgrade Advantech WISE-DeviceOn Server to version 5.4 or later once available, as this will likely include a fix for the vulnerability. 2) In the interim, restrict device renaming privileges to only highly trusted and trained personnel to reduce the risk of malicious input. 3) Implement web application firewall (WAF) rules to detect and block suspicious script content in HTTP requests targeting the /rmm/v1/devices/name/{agent_id} endpoint. 4) Conduct regular audits of device names for suspicious or unexpected script tags or HTML entities. 5) Enforce strong authentication and session management controls to limit the impact of session hijacking. 6) Educate users to be cautious when interacting with device names and to report unusual behavior. 7) If possible, apply input validation or output encoding at the proxy or application layer to sanitize device name inputs and outputs. 8) Monitor logs for anomalous rename activities and unusual user behavior. These steps go beyond generic advice by focusing on access control, monitoring, and layered defenses specific to the vulnerable endpoint and usage context.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.579Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693316aef88dbe026cfdbe1b

Added to database: 12/5/2025, 5:30:22 PM

Last enriched: 12/19/2025, 6:37:48 PM

Last updated: 2/7/2026, 4:15:10 AM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats