Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34262: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Advantech Co., Ltd. WISE-DeviceOn Server

0
Medium
VulnerabilityCVE-2025-34262cvecve-2025-34262cwe-79
Published: Fri Dec 05 2025 (12/05/2025, 17:16:55 UTC)
Source: CVE Database V5
Vendor/Project: Advantech Co., Ltd.
Product: WISE-DeviceOn Server

Description

Advantech WISE-DeviceOn Server versions prior to 5.4 contain a stored cross-site scripting (XSS) vulnerability in the /rmm/v1/devices/name/{agent_id} endpoint. When an authenticated user renames a device, the new_name value is stored and later rendered in device listings or detail views without proper HTML sanitation. An attacker can inject malicious script into the device name, which is then executed in the browser context of users who view or interact with the affected device, potentially enabling session compromise and unauthorized actions as the victim.

AI-Powered Analysis

AILast updated: 12/05/2025, 17:47:17 UTC

Technical Analysis

CVE-2025-34262 is a stored cross-site scripting (XSS) vulnerability identified in Advantech Co., Ltd.'s WISE-DeviceOn Server, specifically affecting versions prior to 5.4. The vulnerability resides in the /rmm/v1/devices/name/{agent_id} REST API endpoint, which allows authenticated users to rename devices managed by the server. The issue arises because the new_name parameter is not properly sanitized before being stored and subsequently rendered in device listings or detail views. This improper neutralization of input (CWE-79) enables an attacker with authenticated access to inject malicious JavaScript code into device names. When other users view or interact with these device names in the web interface, the injected script executes in their browser context. This can lead to session hijacking, unauthorized actions performed on behalf of the victim, or other attacks leveraging the victim's privileges. The vulnerability requires the attacker to have at least some level of authenticated access to the system and relies on user interaction to trigger the malicious payload. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N) reflects network attack vector, low attack complexity, no attack prerequisites, partial privileges required, user interaction needed, and limited confidentiality and integrity impacts. No public exploits are currently known, and no patches have been linked yet, indicating the need for vigilance and proactive mitigation by affected organizations.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the confidentiality and integrity of device management operations within networks using Advantech WISE-DeviceOn Server. Successful exploitation could allow attackers to hijack user sessions, escalate privileges, or perform unauthorized actions within the device management console. This could lead to disruption of industrial control systems or IoT device management, potentially affecting operational continuity and data integrity. Given the use of WISE-DeviceOn Server in industrial automation and IoT environments, the impact could extend to critical infrastructure sectors such as manufacturing, energy, and transportation. The requirement for authenticated access limits the attack surface but insider threats or compromised credentials could be leveraged. The medium severity rating suggests moderate risk, but the potential for lateral movement and further exploitation in industrial environments elevates the concern for European entities reliant on these systems.

Mitigation Recommendations

European organizations should immediately verify their WISE-DeviceOn Server versions and plan upgrades to version 5.4 or later once available. In the absence of an official patch, implement strict input validation and output encoding on the device renaming functionality to neutralize malicious scripts. Limit user privileges to the minimum necessary, especially restricting who can rename devices. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting the /rmm/v1/devices/name/{agent_id} endpoint. Monitor logs for unusual device renaming activities or repeated failed attempts to inject scripts. Educate users about the risks of interacting with untrusted device names and enforce multi-factor authentication to reduce the risk of credential compromise. Regularly audit device management interfaces and conduct penetration testing focused on XSS vulnerabilities. Finally, establish incident response procedures to quickly address any detected exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.579Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693316aef88dbe026cfdbe1b

Added to database: 12/5/2025, 5:30:22 PM

Last enriched: 12/5/2025, 5:47:17 PM

Last updated: 12/8/2025, 5:22:43 PM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats