CVE-2025-40900: CWE-1336 Improper neutralization of special elements used in a template engine in Nozomi Networks Guardian
An Angular template injection vulnerability was discovered in the Reports functionality due to improper validation of an input parameter. An authenticated user with report privileges can define a malicious report containing an Angular template payload, or a victim can be socially engineered to import a malicious report template. When the victim views or imports the report, the Angular template executes in their browser context, allowing the attacker to modify application data, or disrupt application availability. Full XSS exploitation and direct information disclosure are prevented by the existing input validation and Content Security Policy configuration.
AI Analysis
Technical Summary
This vulnerability involves improper neutralization of special elements in Angular templates within the Reports feature of Nozomi Networks Guardian. An authenticated user with report privileges can inject Angular template code into reports, which executes in the browser of users who view or import these reports. The vulnerability allows limited impact such as modification of application data or disruption of application availability. Existing input validation and Content Security Policy prevent full XSS exploitation and direct information disclosure. No patch or official remediation level has been published, and the product is not a cloud service.
Potential Impact
An attacker with report privileges can craft malicious report templates that execute Angular code in the browser context of users who view or import them. This may lead to unauthorized modification of application data or disruption of application availability. The vulnerability does not allow full cross-site scripting or direct information disclosure due to existing mitigations. There are no known exploits in the wild at this time.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is available, limit report privileges to trusted users only and exercise caution when importing report templates from untrusted sources. The existing input validation and Content Security Policy provide partial mitigation against full exploitation.
CVE-2025-40900: CWE-1336 Improper neutralization of special elements used in a template engine in Nozomi Networks Guardian
Description
An Angular template injection vulnerability was discovered in the Reports functionality due to improper validation of an input parameter. An authenticated user with report privileges can define a malicious report containing an Angular template payload, or a victim can be socially engineered to import a malicious report template. When the victim views or imports the report, the Angular template executes in their browser context, allowing the attacker to modify application data, or disrupt application availability. Full XSS exploitation and direct information disclosure are prevented by the existing input validation and Content Security Policy configuration.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
This vulnerability involves improper neutralization of special elements in Angular templates within the Reports feature of Nozomi Networks Guardian. An authenticated user with report privileges can inject Angular template code into reports, which executes in the browser of users who view or import these reports. The vulnerability allows limited impact such as modification of application data or disruption of application availability. Existing input validation and Content Security Policy prevent full XSS exploitation and direct information disclosure. No patch or official remediation level has been published, and the product is not a cloud service.
Potential Impact
An attacker with report privileges can craft malicious report templates that execute Angular code in the browser context of users who view or import them. This may lead to unauthorized modification of application data or disruption of application availability. The vulnerability does not allow full cross-site scripting or direct information disclosure due to existing mitigations. There are no known exploits in the wild at this time.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is available, limit report privileges to trusted users only and exercise caution when importing report templates from untrusted sources. The existing input validation and Content Security Policy provide partial mitigation against full exploitation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Nozomi
- Date Reserved
- 2025-04-16T09:04:35.923Z
- Cvss Version
- 4.0
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 6a0c6776ec166c07b0a98c0f
Added to database: 5/19/2026, 1:36:54 PM
Last enriched: 5/19/2026, 2:08:44 PM
Last updated: 5/20/2026, 1:33:33 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.