CVE-2025-36750: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Growatt ShineLan-X
ShineLan-X contains a stored cross site scripting (XSS) vulnerability in the Plant Name field. A HTML payload will be displayed on the plant management page via a direct post. This may allow attackers to force a legitimate user’s browser’s JavaScript engine to run malicious code.
AI Analysis
Technical Summary
CVE-2025-36750 identifies a stored cross-site scripting (XSS) vulnerability in the Growatt ShineLan-X product, version 3.6.0.0. The vulnerability stems from improper neutralization of input during web page generation (CWE-79), specifically in the Plant Name field. An attacker can submit a crafted HTML payload via a direct POST request, which is then stored and rendered on the plant management page without adequate sanitization or encoding. This results in the victim's browser executing the injected JavaScript code within the security context of the ShineLan-X web application. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:L/SC:H/SI:H/SA:H) indicates network attack vector, low attack complexity, no user interaction, and no authentication required beyond low privileges, with high impact on confidentiality and scope. The vulnerability could enable attackers to steal session tokens, manipulate plant management data, or perform unauthorized actions by leveraging the victim's browser. While no public exploits are known yet, the vulnerability's nature and high CVSS score make it a critical concern for organizations relying on ShineLan-X for solar energy management. The lack of available patches at the time of publication necessitates immediate compensating controls and monitoring.
Potential Impact
For European organizations, especially those managing solar energy infrastructure with Growatt ShineLan-X, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to plant management interfaces, manipulation of operational data, and potential disruption of energy production. Confidential data such as plant configurations and user credentials could be compromised, impacting both operational integrity and privacy compliance under regulations like GDPR. The ability to execute arbitrary JavaScript without user interaction or elevated privileges increases the attack surface and potential for automated exploitation campaigns. Disruptions in renewable energy management could have broader economic and environmental consequences, particularly in countries heavily investing in solar power. Additionally, compromised systems could serve as footholds for further attacks within organizational networks, amplifying the threat.
Mitigation Recommendations
Immediate mitigation should focus on implementing strict input validation and output encoding for the Plant Name field to prevent injection of malicious scripts. Organizations should restrict access to the ShineLan-X management interface to trusted networks and users with minimal privileges. Deploy web application firewalls (WAFs) with rules targeting XSS payload patterns to detect and block exploitation attempts. Monitor logs for unusual POST requests or unexpected script execution behaviors. Since no official patches are currently available, coordinate with Growatt for timely updates and apply them as soon as released. Conduct security awareness training for administrators to recognize potential signs of exploitation. Consider isolating ShineLan-X management systems from broader enterprise networks to limit lateral movement in case of compromise. Regularly audit and test the application for similar vulnerabilities to ensure comprehensive protection.
Affected Countries
Germany, Spain, Italy, France, Netherlands
CVE-2025-36750: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Growatt ShineLan-X
Description
ShineLan-X contains a stored cross site scripting (XSS) vulnerability in the Plant Name field. A HTML payload will be displayed on the plant management page via a direct post. This may allow attackers to force a legitimate user’s browser’s JavaScript engine to run malicious code.
AI-Powered Analysis
Technical Analysis
CVE-2025-36750 identifies a stored cross-site scripting (XSS) vulnerability in the Growatt ShineLan-X product, version 3.6.0.0. The vulnerability stems from improper neutralization of input during web page generation (CWE-79), specifically in the Plant Name field. An attacker can submit a crafted HTML payload via a direct POST request, which is then stored and rendered on the plant management page without adequate sanitization or encoding. This results in the victim's browser executing the injected JavaScript code within the security context of the ShineLan-X web application. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:L/SC:H/SI:H/SA:H) indicates network attack vector, low attack complexity, no user interaction, and no authentication required beyond low privileges, with high impact on confidentiality and scope. The vulnerability could enable attackers to steal session tokens, manipulate plant management data, or perform unauthorized actions by leveraging the victim's browser. While no public exploits are known yet, the vulnerability's nature and high CVSS score make it a critical concern for organizations relying on ShineLan-X for solar energy management. The lack of available patches at the time of publication necessitates immediate compensating controls and monitoring.
Potential Impact
For European organizations, especially those managing solar energy infrastructure with Growatt ShineLan-X, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to plant management interfaces, manipulation of operational data, and potential disruption of energy production. Confidential data such as plant configurations and user credentials could be compromised, impacting both operational integrity and privacy compliance under regulations like GDPR. The ability to execute arbitrary JavaScript without user interaction or elevated privileges increases the attack surface and potential for automated exploitation campaigns. Disruptions in renewable energy management could have broader economic and environmental consequences, particularly in countries heavily investing in solar power. Additionally, compromised systems could serve as footholds for further attacks within organizational networks, amplifying the threat.
Mitigation Recommendations
Immediate mitigation should focus on implementing strict input validation and output encoding for the Plant Name field to prevent injection of malicious scripts. Organizations should restrict access to the ShineLan-X management interface to trusted networks and users with minimal privileges. Deploy web application firewalls (WAFs) with rules targeting XSS payload patterns to detect and block exploitation attempts. Monitor logs for unusual POST requests or unexpected script execution behaviors. Since no official patches are currently available, coordinate with Growatt for timely updates and apply them as soon as released. Conduct security awareness training for administrators to recognize potential signs of exploitation. Consider isolating ShineLan-X management systems from broader enterprise networks to limit lateral movement in case of compromise. Regularly audit and test the application for similar vulnerabilities to ensure comprehensive protection.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- DIVD
- Date Reserved
- 2025-04-15T21:54:36.814Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 693d2747f35c2264d84722f0
Added to database: 12/13/2025, 8:43:51 AM
Last enriched: 12/13/2025, 8:49:49 AM
Last updated: 12/15/2025, 1:35:59 AM
Views: 16
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14695: Dynamically-Managed Code Resources in SamuNatsu HaloBot
MediumCVE-2025-14694: SQL Injection in ketr JEPaaS
MediumCVE-2025-14693: Symlink Following in Ugreen DH2100+
HighCVE-2025-67901: CWE-1284 Improper Validation of Specified Quantity in Input in kristapsdz openrsync
MediumCVE-2025-14692: Open Redirect in Mayan EDMS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.