Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34265: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Advantech Co., Ltd. WISE-DeviceOn Server

0
Medium
VulnerabilityCVE-2025-34265cvecve-2025-34265cwe-79
Published: Fri Dec 05 2025 (12/05/2025, 17:18:10 UTC)
Source: CVE Database V5
Vendor/Project: Advantech Co., Ltd.
Product: WISE-DeviceOn Server

Description

Advantech WISE-DeviceOn Server versions prior to 5.4 contain a stored cross-site scripting (XSS) vulnerability in the /rmm/v1/rule-engines endpoint. When an authenticated user creates or updates a rule for an agent, the rule fields min, max, and unit are stored and later rendered in rule listings or detail views without proper HTML sanitation. An attacker can inject malicious script into one or more of these fields, which is then executed in the browser context of users who view or interact with the affected rule, potentially enabling session compromise and unauthorized actions as the victim.

AI-Powered Analysis

AILast updated: 12/19/2025, 20:03:19 UTC

Technical Analysis

The vulnerability CVE-2025-34265 affects Advantech Co., Ltd.'s WISE-DeviceOn Server, a platform used for managing IoT and industrial devices. Versions prior to 5.4 contain a stored cross-site scripting (XSS) flaw in the /rmm/v1/rule-engines API endpoint. When an authenticated user creates or updates a rule for an agent, the input fields min, max, and unit are stored and later displayed in rule listings or detail views without proper HTML encoding or sanitization. This improper neutralization of input (CWE-79) allows an attacker with authenticated access to inject malicious JavaScript code into these fields. When other users view or interact with the affected rules, the injected script executes in their browser context, potentially enabling session hijacking, privilege escalation, or unauthorized actions within the management interface. The vulnerability requires authentication but no elevated privileges and some user interaction (viewing the rule). The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required beyond authentication, user interaction required, and low impact on confidentiality and integrity but limited impact on availability. No public exploits are currently known, but the vulnerability poses a risk to the security of device management operations and could be leveraged for lateral movement or persistent access in industrial environments.

Potential Impact

For European organizations, especially those in critical infrastructure sectors such as manufacturing, energy, and transportation that rely on Advantech WISE-DeviceOn Server for IoT device management, this vulnerability could lead to unauthorized access and control over device management consoles. Exploitation could result in session hijacking, enabling attackers to manipulate device configurations, disrupt operations, or pivot into other parts of the network. Given the industrial and IoT focus of Advantech products, the impact extends beyond IT systems to operational technology (OT), potentially affecting physical processes and safety. The medium severity rating reflects moderate risk, but the potential for targeted attacks in industrial environments increases the threat significance. The lack of known exploits suggests a window for proactive mitigation before active exploitation occurs.

Mitigation Recommendations

Organizations should immediately upgrade Advantech WISE-DeviceOn Server to version 5.4 or later once available, as this version presumably addresses the vulnerability. Until patches are applied, implement strict access controls to limit authenticated user permissions to only trusted personnel, minimizing the risk of malicious rule creation. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious script injection patterns in the /rmm/v1/rule-engines endpoint. Conduct regular audits of existing rules for suspicious or unexpected content in min, max, and unit fields. Educate users to recognize and report unusual behavior in the management interface. Additionally, monitor logs for anomalous activity related to rule creation or modification. Segmentation of the management network and use of multi-factor authentication (MFA) can further reduce exploitation risk. Finally, coordinate with Advantech support for any available workarounds or security advisories.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.579Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693316aef88dbe026cfdbe2a

Added to database: 12/5/2025, 5:30:22 PM

Last enriched: 12/19/2025, 8:03:19 PM

Last updated: 1/20/2026, 6:26:58 PM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats