Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36746: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in SolarEdge SolarEdge Monitoring platform (SaaS)

0
Medium
VulnerabilityCVE-2025-36746cvecve-2025-36746cwe-79
Published: Fri Dec 12 2025 (12/12/2025, 15:05:40 UTC)
Source: CVE Database V5
Vendor/Project: SolarEdge
Product: SolarEdge Monitoring platform (SaaS)

Description

SolarEdge monitoring platform contains a Cross‑Site Scripting (XSS) flaw that allows an authenticated user to inject payloads into report names, which may execute in a victim’s browser during a deletion attempt.

AI-Powered Analysis

AILast updated: 12/12/2025, 15:35:54 UTC

Technical Analysis

CVE-2025-36746 identifies a Cross-Site Scripting (XSS) vulnerability in the SolarEdge Monitoring platform, a SaaS solution used for managing and monitoring solar energy systems. The flaw stems from improper neutralization of input during web page generation (CWE-79), specifically in the handling of report names. Authenticated users can inject malicious JavaScript payloads into report names, which are then rendered unsanitized in the user interface during report deletion attempts. When another user attempts to delete such a report, the injected script executes in their browser context. This can lead to various attacks, including session hijacking, unauthorized actions, or data theft. The vulnerability requires the attacker to have valid credentials and some user interaction (attempting to delete a report). The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L - limited privileges), user interaction required (UI:A), and low impact on confidentiality, integrity, and availability. No patches or exploits are currently available, but the vulnerability is publicly disclosed and should be addressed. The SaaS nature of the platform means the vulnerability affects users accessing the service via web browsers, increasing the risk of client-side exploitation.

Potential Impact

For European organizations, especially those involved in renewable energy and solar power management, this vulnerability could lead to unauthorized script execution within the SolarEdge Monitoring platform. Potential impacts include theft of session tokens, unauthorized actions performed on behalf of legitimate users, and exposure of sensitive operational data. Given the platform's role in monitoring critical energy infrastructure, exploitation could disrupt monitoring activities or lead to misinformation. Although the vulnerability requires authenticated access and user interaction, insider threats or compromised accounts could be leveraged to exploit it. The medium severity suggests moderate risk, but the strategic importance of energy infrastructure in Europe elevates the potential consequences. Disruption or data compromise in solar energy management could affect energy supply reliability and regulatory compliance.

Mitigation Recommendations

To mitigate this vulnerability, SolarEdge should implement robust input validation and output encoding for all user-supplied data, especially report names, to prevent script injection. Employing a strict Content Security Policy (CSP) can help restrict the execution of unauthorized scripts. Organizations should enforce strong authentication mechanisms, including multi-factor authentication, to reduce the risk of account compromise. Monitoring and logging user activities related to report creation and deletion can help detect suspicious behavior. Users should be trained to recognize unusual platform behavior and avoid clicking on suspicious links or performing deletion actions without verification. Until a patch is released, restricting report deletion privileges to trusted users and minimizing the number of users with such permissions can reduce exposure. Regularly updating the SaaS platform and applying vendor-provided security updates promptly is essential once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
DIVD
Date Reserved
2025-04-15T21:54:36.813Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693c347d2e981ee9614b5bc7

Added to database: 12/12/2025, 3:27:57 PM

Last enriched: 12/12/2025, 3:35:54 PM

Last updated: 12/15/2025, 4:08:44 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats