Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36750: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Growatt ShineLan-X

0
High
VulnerabilityCVE-2025-36750cvecve-2025-36750cwe-79
Published: Sat Dec 13 2025 (12/13/2025, 08:16:22 UTC)
Source: CVE Database V5
Vendor/Project: Growatt
Product: ShineLan-X

Description

ShineLan-X contains a stored cross site scripting (XSS) vulnerability in the Plant Name field. A HTML payload will be displayed on the plant management page via a direct post. This may allow attackers to force a legitimate user’s browser’s JavaScript engine to run malicious code.

AI-Powered Analysis

AILast updated: 12/13/2025, 08:49:49 UTC

Technical Analysis

CVE-2025-36750 identifies a stored cross-site scripting (XSS) vulnerability in the Growatt ShineLan-X product, version 3.6.0.0. The vulnerability stems from improper neutralization of input during web page generation (CWE-79), specifically in the Plant Name field. An attacker can submit a crafted HTML payload via a direct POST request, which is then stored and rendered on the plant management page without adequate sanitization or encoding. This results in the victim's browser executing the injected JavaScript code within the security context of the ShineLan-X web application. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:L/SC:H/SI:H/SA:H) indicates network attack vector, low attack complexity, no user interaction, and no authentication required beyond low privileges, with high impact on confidentiality and scope. The vulnerability could enable attackers to steal session tokens, manipulate plant management data, or perform unauthorized actions by leveraging the victim's browser. While no public exploits are known yet, the vulnerability's nature and high CVSS score make it a critical concern for organizations relying on ShineLan-X for solar energy management. The lack of available patches at the time of publication necessitates immediate compensating controls and monitoring.

Potential Impact

For European organizations, especially those managing solar energy infrastructure with Growatt ShineLan-X, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to plant management interfaces, manipulation of operational data, and potential disruption of energy production. Confidential data such as plant configurations and user credentials could be compromised, impacting both operational integrity and privacy compliance under regulations like GDPR. The ability to execute arbitrary JavaScript without user interaction or elevated privileges increases the attack surface and potential for automated exploitation campaigns. Disruptions in renewable energy management could have broader economic and environmental consequences, particularly in countries heavily investing in solar power. Additionally, compromised systems could serve as footholds for further attacks within organizational networks, amplifying the threat.

Mitigation Recommendations

Immediate mitigation should focus on implementing strict input validation and output encoding for the Plant Name field to prevent injection of malicious scripts. Organizations should restrict access to the ShineLan-X management interface to trusted networks and users with minimal privileges. Deploy web application firewalls (WAFs) with rules targeting XSS payload patterns to detect and block exploitation attempts. Monitor logs for unusual POST requests or unexpected script execution behaviors. Since no official patches are currently available, coordinate with Growatt for timely updates and apply them as soon as released. Conduct security awareness training for administrators to recognize potential signs of exploitation. Consider isolating ShineLan-X management systems from broader enterprise networks to limit lateral movement in case of compromise. Regularly audit and test the application for similar vulnerabilities to ensure comprehensive protection.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
DIVD
Date Reserved
2025-04-15T21:54:36.814Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693d2747f35c2264d84722f0

Added to database: 12/13/2025, 8:43:51 AM

Last enriched: 12/13/2025, 8:49:49 AM

Last updated: 12/15/2025, 1:35:59 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats