Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-40895: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Nozomi Networks CMC

0
Low
VulnerabilityCVE-2025-40895cvecve-2025-40895cwe-79
Published: Wed Mar 04 2026 (03/04/2026, 13:52:13 UTC)
Source: CVE Database V5
Vendor/Project: Nozomi Networks
Product: CMC

Description

A Stored HTML Injection vulnerability was discovered in the CMC's Sensor Map functionality due to improper validation on connected Guardians' properties. A malicious authenticated user with administrator privileges on a Guardian connected to a CMC can edit the Guardian's properties to inject HTML tags. If the Sensor Map functionality is enabled in the CMC, when a victim CMC user interacts with it, then the injected HTML may render in their browser, enabling phishing and possibly open redirect attacks. Full XSS exploitation and direct information disclosure are prevented by the existing input validation and Content Security Policy configuration.

AI-Powered Analysis

AILast updated: 03/04/2026, 14:18:07 UTC

Technical Analysis

CVE-2025-40895 is a stored HTML injection vulnerability classified under CWE-79 (Improper Neutralization of Input During Web Page Generation) affecting Nozomi Networks CMC, specifically its Sensor Map functionality. The issue arises from insufficient validation of properties on connected Guardians, which are components integrated with the CMC platform. An attacker with administrator privileges on a Guardian can manipulate its properties to inject arbitrary HTML code. When a user of the CMC interacts with the Sensor Map, this injected HTML is rendered in their browser. This could facilitate phishing attacks by displaying deceptive content or enable open redirect attacks by manipulating links. Despite this, the vulnerability does not allow full cross-site scripting exploitation or direct data disclosure due to existing input validation measures and a Content Security Policy that restricts script execution and resource loading. The attack vector requires the attacker to have high privileges (administrator on a Guardian) and requires user interaction (the victim must interact with the Sensor Map). The CVSS 4.0 vector indicates network attack vector, low attack complexity, partial authentication required, high privileges, partial user interaction, no confidentiality or availability impact, low integrity impact, and limited scope. No patches or known exploits are currently documented, and the vulnerability was published in March 2026.

Potential Impact

The impact of this vulnerability is relatively limited due to several mitigating factors. The requirement for an attacker to have administrator privileges on a Guardian restricts the pool of potential attackers to trusted insiders or compromised accounts with elevated rights. The necessity for user interaction (engaging with the Sensor Map) further reduces the likelihood of exploitation. Potential impacts include phishing attacks or open redirect scenarios that could deceive users into divulging sensitive information or visiting malicious sites. However, the inability to execute full cross-site scripting or directly disclose information limits the severity. For organizations relying on Nozomi Networks CMC in critical infrastructure or industrial control environments, even low-severity vulnerabilities warrant attention due to the sensitive nature of these deployments. Attackers exploiting this vulnerability could undermine user trust or attempt lateral movement by leveraging social engineering facilitated through the injected HTML.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first ensure strict access control and monitoring of administrator privileges on Guardians connected to the CMC. Limit the number of users with such high-level access and enforce strong authentication mechanisms, including multi-factor authentication. Regularly audit Guardian property changes to detect unauthorized or suspicious modifications. Disable the Sensor Map functionality if it is not essential to reduce the attack surface. Implement additional input validation and sanitization on the server side for all properties that can be edited by administrators to prevent injection of HTML or script content. Review and strengthen Content Security Policy configurations to further restrict the execution of injected content. Stay informed about vendor patches or updates addressing this vulnerability and apply them promptly once available. Conduct user awareness training to recognize phishing attempts that might arise from this vulnerability. Finally, consider network segmentation to isolate CMC components and reduce the impact of compromised credentials.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Nozomi
Date Reserved
2025-04-16T09:04:35.922Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a83ba8d1a09e29cb3ef912

Added to database: 3/4/2026, 2:03:20 PM

Last enriched: 3/4/2026, 2:18:07 PM

Last updated: 3/4/2026, 3:31:10 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses