Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34266: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Advantech Co., Ltd. WISE-DeviceOn Server

0
Medium
VulnerabilityCVE-2025-34266cvecve-2025-34266cwe-79
Published: Fri Dec 05 2025 (12/05/2025, 17:17:35 UTC)
Source: CVE Database V5
Vendor/Project: Advantech Co., Ltd.
Product: WISE-DeviceOn Server

Description

CVE-2025-34266 is a stored cross-site scripting (XSS) vulnerability in Advantech WISE-DeviceOn Server versions prior to 5. 4, specifically in the /rmm/v1/plugin-config/addins/menus endpoint. Authenticated users can inject malicious scripts via the label and path fields of AddIns menu entries, which are stored and later rendered without proper HTML sanitization. This allows execution of arbitrary scripts in the browsers of users who view or interact with the compromised AddIns UI, potentially leading to session hijacking and unauthorized actions. The vulnerability requires authenticated access and some user interaction but can be exploited remotely over the network. The CVSS 4. 0 base score is 5. 1, indicating medium severity. No known public exploits exist yet. European organizations using affected versions of WISE-DeviceOn Server should prioritize patching or mitigating this issue to prevent potential compromise.

AI-Powered Analysis

AILast updated: 12/05/2025, 17:46:19 UTC

Technical Analysis

CVE-2025-34266 is a stored cross-site scripting (XSS) vulnerability classified under CWE-79, affecting Advantech Co., Ltd.'s WISE-DeviceOn Server versions prior to 5.4. The vulnerability resides in the /rmm/v1/plugin-config/addins/menus REST API endpoint, which allows authenticated users to add or edit AddIns menu entries. The label and path parameters submitted by users are stored in the plugin configuration data and later rendered in the AddIns user interface without proper HTML or JavaScript sanitization or encoding. This improper neutralization of input enables an attacker with authenticated access to inject malicious JavaScript code into these fields. When other users view or interact with the affected AddIns menu entries, the injected script executes in their browser context. This can lead to session token theft, unauthorized actions performed on behalf of the victim, or other malicious activities such as redirecting users to phishing sites or installing malware. The vulnerability requires the attacker to have at least low-level privileges (authenticated user) and some user interaction (viewing or interacting with the malicious AddIns entry). The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required for exploitation (PR:L), user interaction required (UI:P), and low impact on confidentiality and integrity, with no impact on availability. No public exploits or patches have been reported as of the publication date, but the issue is publicly disclosed and should be addressed promptly. The vulnerability is particularly concerning in environments where multiple users have access to the WISE-DeviceOn Server UI, as it could facilitate lateral movement or privilege escalation through session hijacking or unauthorized commands executed via the victim’s browser.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to the confidentiality and integrity of user sessions and data accessed via the WISE-DeviceOn Server interface. Organizations using affected versions may face session hijacking, unauthorized command execution, or data manipulation if attackers exploit this XSS flaw. This is especially critical in industrial or IoT environments where WISE-DeviceOn Server is used for device management and monitoring, potentially impacting operational technology (OT) systems. Compromise could lead to unauthorized control or disruption of connected devices, causing operational downtime or safety risks. The vulnerability's requirement for authenticated access limits exposure but insider threats or compromised credentials could facilitate exploitation. Additionally, the stored nature of the XSS means persistent risk until the malicious payload is removed or the system patched. European entities in sectors such as manufacturing, energy, and critical infrastructure using Advantech products should consider this a significant concern due to the potential cascading effects on industrial control systems and supply chains.

Mitigation Recommendations

1. Upgrade: Immediately upgrade Advantech WISE-DeviceOn Server to version 5.4 or later where the vulnerability is fixed. 2. Input Validation: Implement strict server-side input validation and sanitization for the label and path fields in the AddIns menu configuration to neutralize HTML and JavaScript content. 3. Output Encoding: Ensure proper output encoding (e.g., HTML entity encoding) when rendering user-supplied data in the UI to prevent script execution. 4. Access Controls: Restrict AddIns menu editing privileges to trusted administrators only, minimizing the number of users who can inject malicious content. 5. Monitoring and Logging: Enable detailed logging of AddIns menu changes and monitor for suspicious modifications or unusual user activity. 6. User Awareness: Educate users to be cautious when interacting with AddIns menus and report unexpected behavior. 7. Web Application Firewall (WAF): Deploy a WAF with rules to detect and block common XSS attack patterns targeting the affected endpoint. 8. Session Management: Implement secure session management practices, including HttpOnly and Secure flags on cookies, to reduce the impact of session hijacking. 9. Incident Response: Prepare to quickly identify and remove malicious AddIns entries if exploitation is suspected. These steps collectively reduce the risk of exploitation and limit potential damage.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.579Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693316b0f88dbe026cfdbe39

Added to database: 12/5/2025, 5:30:24 PM

Last enriched: 12/5/2025, 5:46:19 PM

Last updated: 12/6/2025, 12:59:37 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats