Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34263: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Advantech Co., Ltd. WISE-DeviceOn Server

0
Medium
VulnerabilityCVE-2025-34263cvecve-2025-34263cwe-79
Published: Fri Dec 05 2025 (12/05/2025, 17:17:52 UTC)
Source: CVE Database V5
Vendor/Project: Advantech Co., Ltd.
Product: WISE-DeviceOn Server

Description

Advantech WISE-DeviceOn Server versions prior to 5.4 contain a stored cross-site scripting (XSS) vulnerability in the /rmm/v1/plugin-config/dashboards/menus endpoint. When an authenticated user adds or edits a dashboard entry, the label and path values are stored in plugin configuration data and later rendered in the dashboard UI without proper HTML sanitation. An attacker can inject malicious script into either field, which is then executed in the browser context of users who view or interact with the affected dashboard, potentially enabling session compromise and unauthorized actions as the victim.

AI-Powered Analysis

AILast updated: 12/19/2025, 20:03:03 UTC

Technical Analysis

CVE-2025-34263 is a stored cross-site scripting (XSS) vulnerability identified in Advantech Co., Ltd.'s WISE-DeviceOn Server, affecting versions prior to 5.4. The vulnerability resides in the /rmm/v1/plugin-config/dashboards/menus REST API endpoint, which allows authenticated users to add or edit dashboard entries. Specifically, the 'label' and 'path' fields of dashboard entries are stored in plugin configuration data without proper HTML sanitization. When these fields are rendered in the dashboard user interface, the lack of input neutralization enables malicious script injection. An attacker with authenticated access can exploit this by injecting JavaScript payloads into these fields. When other users view or interact with the compromised dashboard, the injected scripts execute within their browser context, potentially allowing session cookie theft, user impersonation, or unauthorized actions within the application. The vulnerability requires the attacker to have at least low-level privileges (authenticated user) and some user interaction (viewing the dashboard). The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required beyond authentication (PR:L), user interaction required (UI:P), and low impact on confidentiality and integrity (VC:L, VI:L) with no impact on availability (VA:N). No public exploits are currently known, and no official patches have been linked yet. This vulnerability is classified under CWE-79, which covers improper neutralization of input during web page generation, a common cause of XSS vulnerabilities. Given the nature of the WISE-DeviceOn Server as an industrial IoT device management platform, exploitation could lead to unauthorized control or data leakage within industrial environments.

Potential Impact

For European organizations, especially those in industrial sectors relying on Advantech WISE-DeviceOn Server for IoT device management, this vulnerability poses a risk of session hijacking and unauthorized actions within the management console. Successful exploitation could allow attackers to execute arbitrary scripts in the context of legitimate users, potentially leading to credential theft, privilege escalation, or manipulation of device configurations. This could disrupt operational technology (OT) environments, leading to operational downtime or safety risks. The medium CVSS score reflects moderate impact, but the actual risk depends on the deployment scale and user roles. Since the vulnerability requires authenticated access, insider threats or compromised credentials increase risk. The lack of known exploits reduces immediate threat but does not eliminate risk, especially as attackers may develop exploits over time. European critical infrastructure and manufacturing sectors using this product are particularly sensitive to such vulnerabilities due to the potential cascading effects on industrial processes and supply chains.

Mitigation Recommendations

1. Upgrade Advantech WISE-DeviceOn Server to version 5.4 or later once available, as this version addresses the vulnerability. 2. Until patches are available, restrict dashboard editing privileges to trusted administrators only, minimizing the number of users who can inject malicious input. 3. Implement strict input validation and output encoding on the server side for all user-supplied data, especially in dashboard configuration fields. 4. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in the dashboard UI. 5. Monitor logs for unusual dashboard configuration changes or unexpected user behavior indicative of exploitation attempts. 6. Educate users about phishing and credential security to reduce the risk of account compromise. 7. Consider network segmentation and access controls to limit exposure of the WISE-DeviceOn Server to only necessary users and systems. 8. Use multi-factor authentication (MFA) to reduce the risk of unauthorized authenticated access. 9. Regularly audit and review user permissions and dashboard configurations for anomalies. 10. Engage with Advantech support for any interim security advisories or workarounds.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.579Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693316aef88dbe026cfdbe20

Added to database: 12/5/2025, 5:30:22 PM

Last enriched: 12/19/2025, 8:03:03 PM

Last updated: 2/4/2026, 4:49:33 AM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats