CVE-2025-36748: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Growatt ShineLan-X
ShineLan-X contains a stored cross site scripting (XSS) vulnerability in the local configuration web server. The JavaScript code snippet can be inserted in the communication module’s settings center. This may allow attackers to force a legitimate user’s browser’s JavaScript engine to run malicious code.
AI Analysis
Technical Summary
CVE-2025-36748 is a stored cross-site scripting (XSS) vulnerability categorized under CWE-79 affecting the Growatt ShineLan-X product, version 3.6.0.0. The vulnerability resides in the local configuration web server of the device, specifically within the communication module’s settings center, where user input is improperly neutralized during web page generation. An attacker can inject malicious JavaScript code snippets into this settings interface, which are then stored and executed in the context of any legitimate user's browser who accesses the affected web interface. This stored XSS does not require user interaction or authentication, making it remotely exploitable over the network (AV:N) with low attack complexity (AC:L). The vulnerability impacts confidentiality heavily (VC:H), with limited impact on availability and integrity. The scope is limited to the local web server but can affect all users accessing the interface. The CVSS 4.0 score of 8.4 reflects the high severity and potential for significant compromise, including session hijacking, credential theft, or unauthorized command execution within the browser context. No patches are currently available, and no known exploits have been reported in the wild as of the publication date. The vulnerability highlights the importance of secure input validation and output encoding in embedded device web interfaces, especially in critical infrastructure components like solar energy management systems.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial, particularly for those relying on Growatt ShineLan-X devices for solar energy management and monitoring. Exploitation could lead to unauthorized access to sensitive configuration data, theft of user credentials, or manipulation of device settings through the victim’s browser. This could disrupt energy management operations, lead to data breaches, or facilitate further network intrusion. Given the increasing adoption of renewable energy solutions in Europe, including solar power systems integrated into critical infrastructure and commercial facilities, the risk extends beyond individual devices to broader operational continuity and data integrity. Additionally, attackers could leverage this vulnerability as a foothold to pivot into internal networks, especially if the devices are accessible remotely or insufficiently segmented. The lack of required user interaction or authentication increases the likelihood of exploitation in environments where the device’s web interface is exposed or accessible to multiple users.
Mitigation Recommendations
1. Immediately restrict access to the ShineLan-X local configuration web server by implementing network segmentation and firewall rules to limit access only to trusted administrators and internal networks. 2. Employ VPN or secure tunnels for remote access to the device’s management interface to prevent unauthorized external access. 3. Implement strict input validation and output encoding on the communication module’s settings center to neutralize potentially malicious scripts; if possible, apply vendor-provided patches or updates once available. 4. Monitor device logs and network traffic for unusual activity indicative of exploitation attempts, such as unexpected JavaScript payloads or anomalous configuration changes. 5. Educate administrators and users about the risks of stored XSS and enforce the principle of least privilege for device management accounts. 6. If patching is not immediately possible, consider disabling or limiting the use of the vulnerable web interface and use alternative management methods if supported. 7. Regularly audit and update device firmware and software to incorporate security fixes and improvements.
Affected Countries
Germany, France, Italy, Spain, Netherlands, Belgium, Poland, United Kingdom
CVE-2025-36748: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Growatt ShineLan-X
Description
ShineLan-X contains a stored cross site scripting (XSS) vulnerability in the local configuration web server. The JavaScript code snippet can be inserted in the communication module’s settings center. This may allow attackers to force a legitimate user’s browser’s JavaScript engine to run malicious code.
AI-Powered Analysis
Technical Analysis
CVE-2025-36748 is a stored cross-site scripting (XSS) vulnerability categorized under CWE-79 affecting the Growatt ShineLan-X product, version 3.6.0.0. The vulnerability resides in the local configuration web server of the device, specifically within the communication module’s settings center, where user input is improperly neutralized during web page generation. An attacker can inject malicious JavaScript code snippets into this settings interface, which are then stored and executed in the context of any legitimate user's browser who accesses the affected web interface. This stored XSS does not require user interaction or authentication, making it remotely exploitable over the network (AV:N) with low attack complexity (AC:L). The vulnerability impacts confidentiality heavily (VC:H), with limited impact on availability and integrity. The scope is limited to the local web server but can affect all users accessing the interface. The CVSS 4.0 score of 8.4 reflects the high severity and potential for significant compromise, including session hijacking, credential theft, or unauthorized command execution within the browser context. No patches are currently available, and no known exploits have been reported in the wild as of the publication date. The vulnerability highlights the importance of secure input validation and output encoding in embedded device web interfaces, especially in critical infrastructure components like solar energy management systems.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial, particularly for those relying on Growatt ShineLan-X devices for solar energy management and monitoring. Exploitation could lead to unauthorized access to sensitive configuration data, theft of user credentials, or manipulation of device settings through the victim’s browser. This could disrupt energy management operations, lead to data breaches, or facilitate further network intrusion. Given the increasing adoption of renewable energy solutions in Europe, including solar power systems integrated into critical infrastructure and commercial facilities, the risk extends beyond individual devices to broader operational continuity and data integrity. Additionally, attackers could leverage this vulnerability as a foothold to pivot into internal networks, especially if the devices are accessible remotely or insufficiently segmented. The lack of required user interaction or authentication increases the likelihood of exploitation in environments where the device’s web interface is exposed or accessible to multiple users.
Mitigation Recommendations
1. Immediately restrict access to the ShineLan-X local configuration web server by implementing network segmentation and firewall rules to limit access only to trusted administrators and internal networks. 2. Employ VPN or secure tunnels for remote access to the device’s management interface to prevent unauthorized external access. 3. Implement strict input validation and output encoding on the communication module’s settings center to neutralize potentially malicious scripts; if possible, apply vendor-provided patches or updates once available. 4. Monitor device logs and network traffic for unusual activity indicative of exploitation attempts, such as unexpected JavaScript payloads or anomalous configuration changes. 5. Educate administrators and users about the risks of stored XSS and enforce the principle of least privilege for device management accounts. 6. If patching is not immediately possible, consider disabling or limiting the use of the vulnerable web interface and use alternative management methods if supported. 7. Regularly audit and update device firmware and software to incorporate security fixes and improvements.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- DIVD
- Date Reserved
- 2025-04-15T21:54:36.814Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 693d2747f35c2264d84722ed
Added to database: 12/13/2025, 8:43:51 AM
Last enriched: 12/20/2025, 9:02:55 AM
Last updated: 2/7/2026, 7:58:37 AM
Views: 72
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2077: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2076: Improper Authorization in yeqifu warehouse
MediumCVE-2025-15491: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Post Slides
HighCVE-2025-15267: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-13463: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.