Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-40891: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Nozomi Networks Guardian

0
Low
VulnerabilityCVE-2025-40891cvecve-2025-40891cwe-79
Published: Thu Dec 18 2025 (12/18/2025, 13:14:35 UTC)
Source: CVE Database V5
Vendor/Project: Nozomi Networks
Product: Guardian

Description

A Stored HTML Injection vulnerability was discovered in the Time Machine Snapshot Diff functionality due to improper validation of network traffic data. An unauthenticated attacker can send specially crafted network packets at two different times to inject HTML tags into asset attributes across two snapshots. Exploitation requires a victim to use the Time Machine Snapshot Diff feature on those specific snapshots and perform specific GUI actions, at which point the injected HTML renders in their browser, enabling phishing and open redirect attacks. Full XSS exploitation is prevented by input validation and Content Security Policy. Attack complexity is high due to multiple required conditions.

AI-Powered Analysis

AILast updated: 12/18/2025, 13:42:12 UTC

Technical Analysis

CVE-2025-40891 is a stored HTML injection vulnerability classified under CWE-79, affecting Nozomi Networks Guardian, specifically its Time Machine Snapshot Diff functionality. The vulnerability arises from improper validation of network traffic data, allowing an unauthenticated attacker to inject malicious HTML tags into asset attributes across two snapshots by sending specially crafted network packets at two distinct times. The injection is stored and only rendered when a user accesses the Snapshot Diff feature and performs specific GUI interactions, which triggers the display of the injected HTML in the victim's browser. This scenario can facilitate phishing attacks and open redirect exploits by manipulating the rendered HTML content. However, the vulnerability does not allow full cross-site scripting exploitation due to existing input validation mechanisms and a Content Security Policy that restricts script execution. The attack complexity is high because it requires precise timing of packet injection and user interaction with the GUI, and no privileges or authentication are needed to send the malicious packets. The vulnerability has a CVSS 4.0 base score of 2.3, indicating low severity, primarily because the impact on confidentiality, integrity, and availability is limited, and exploitation requires user interaction and specific conditions. No known exploits have been reported in the wild, and no patches have been linked yet. This vulnerability highlights the risk of insufficient input sanitization in network traffic processing and the importance of secure handling of stored data in web interfaces.

Potential Impact

For European organizations using Nozomi Networks Guardian, particularly those relying on the Time Machine Snapshot Diff feature for network monitoring and asset management, this vulnerability poses a moderate risk. Although the CVSS score is low, the ability for an unauthenticated attacker to inject HTML that can be rendered in an administrator’s or analyst’s browser could lead to targeted phishing or redirection attacks within the corporate network. This could potentially facilitate credential theft or session hijacking if combined with other vulnerabilities or social engineering. The impact on operational technology (OT) and industrial control systems (ICS) environments, where Nozomi Networks Guardian is often deployed, could be significant if attackers leverage this to disrupt monitoring or gain footholds. However, the high attack complexity and requirement for user interaction limit widespread exploitation. European entities in critical infrastructure sectors such as energy, manufacturing, and transportation that use this product should be particularly vigilant, as attackers may attempt to exploit this vector to gain initial access or escalate privileges within sensitive environments.

Mitigation Recommendations

Organizations should implement the following specific mitigations: 1) Monitor Nozomi Networks communications for official patches or updates addressing this vulnerability and apply them promptly once available. 2) Restrict access to the Time Machine Snapshot Diff feature to trusted users only, minimizing exposure to potentially malicious snapshots. 3) Educate users and administrators on the risks of interacting with untrusted snapshots and the importance of cautious GUI interactions within the product. 4) Employ network-level filtering to detect and block suspicious or anomalous network packets that could be used to inject malicious content. 5) Review and enhance internal Content Security Policies and input validation mechanisms where possible to further reduce the risk of HTML injection. 6) Conduct regular security audits and penetration testing focused on web interface vulnerabilities in OT/ICS monitoring tools. 7) Implement strict role-based access controls and logging to detect unusual activities related to snapshot viewing and manipulation. These measures go beyond generic advice by focusing on the specific attack vector and operational context of the vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Nozomi
Date Reserved
2025-04-16T09:04:25.006Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 694401044eb3efac36886091

Added to database: 12/18/2025, 1:26:28 PM

Last enriched: 12/18/2025, 1:42:12 PM

Last updated: 12/18/2025, 2:45:00 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats