Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36748: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Growatt ShineLan-X

0
High
VulnerabilityCVE-2025-36748cvecve-2025-36748cwe-79
Published: Sat Dec 13 2025 (12/13/2025, 08:16:23 UTC)
Source: CVE Database V5
Vendor/Project: Growatt
Product: ShineLan-X

Description

ShineLan-X contains a stored cross site scripting (XSS) vulnerability in the local configuration web server. The JavaScript code snippet can be inserted in the communication module’s settings center. This may allow attackers to force a legitimate user’s browser’s JavaScript engine to run malicious code.

AI-Powered Analysis

AILast updated: 12/13/2025, 08:50:02 UTC

Technical Analysis

CVE-2025-36748 identifies a stored cross-site scripting (XSS) vulnerability in the Growatt ShineLan-X device, version 3.6.0.0. The vulnerability arises from improper neutralization of input during web page generation in the device’s local configuration web server, specifically within the communication module’s settings center. An attacker with low privileges can inject malicious JavaScript code snippets into the settings interface, which are then stored persistently. When a legitimate user accesses the affected web interface, the injected script executes in their browser context, enabling the attacker to perform actions such as session hijacking, credential theft, or unauthorized commands within the user’s browser session. The CVSS 4.0 score of 8.4 reflects a high severity, driven by network attack vector, no user interaction required, and high impact on confidentiality and integrity. The vulnerability does not impact availability and requires low privileges, indicating that an attacker with limited access to the device’s web interface can exploit it. The scope is limited to the affected version 3.6.0.0 of ShineLan-X. No known public exploits have been reported yet, but the potential for exploitation exists given the device’s role in managing solar energy systems. The lack of an official patch at the time of publication necessitates immediate compensating controls to prevent exploitation. This vulnerability is categorized under CWE-79, which is a common web application security flaw related to improper input sanitization.

Potential Impact

For European organizations, particularly those involved in renewable energy and solar power management, this vulnerability poses a significant risk. Exploitation could lead to unauthorized control or manipulation of solar inverter settings, potentially disrupting energy production or causing operational inefficiencies. Confidentiality breaches could expose sensitive operational data or user credentials, while integrity compromises might allow attackers to alter device configurations or inject malicious commands. Given the increasing reliance on smart energy infrastructure in Europe, successful exploitation could have cascading effects on energy distribution and grid stability. Additionally, attackers could use this vulnerability as a foothold for lateral movement within organizational networks, increasing the risk of broader compromise. The absence of required user interaction and the ability to exploit remotely over the network heighten the threat level. Organizations may also face compliance and regulatory repercussions if the vulnerability leads to data breaches or operational disruptions.

Mitigation Recommendations

Until an official patch is released, European organizations should implement several specific mitigations: 1) Restrict access to the ShineLan-X web interface by implementing strict network segmentation and firewall rules to limit access only to trusted administrators and management systems. 2) Employ VPNs or secure tunnels for remote access to the device’s configuration interface to prevent exposure to the public internet. 3) Regularly audit and monitor device logs and network traffic for unusual activity indicative of attempted or successful exploitation. 4) Disable or limit the use of the communication module’s settings center if feasible, or restrict input fields to trusted users only. 5) Educate administrators on the risks of XSS and ensure they do not interact with suspicious or unsolicited configuration changes. 6) Prepare for rapid deployment of patches once available by maintaining an up-to-date asset inventory and vulnerability management process. 7) Consider deploying web application firewalls (WAFs) or intrusion prevention systems (IPS) capable of detecting and blocking XSS payloads targeting the device’s web interface. These targeted measures go beyond generic advice by focusing on access control, monitoring, and operational readiness specific to the ShineLan-X environment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
DIVD
Date Reserved
2025-04-15T21:54:36.814Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693d2747f35c2264d84722ed

Added to database: 12/13/2025, 8:43:51 AM

Last enriched: 12/13/2025, 8:50:02 AM

Last updated: 12/15/2025, 1:35:48 AM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats