Skip to main content

CVE-2025-4648: CWE-494 Download of Code Without Integrity Check in Centreon web

High
VulnerabilityCVE-2025-4648cvecve-2025-4648cwe-494
Published: Tue May 13 2025 (05/13/2025, 09:45:41 UTC)
Source: CVE
Vendor/Project: Centreon
Product: web

Description

Download of Code Without Integrity Check vulnerability in Centreon web allows Reflected XSS. A user with elevated privileges can inject XSS by altering the content of a SVG media during the submit request. This issue affects web: from 24.10.0 before 24.10.5, from 24.04.0 before 24.04.11, from 23.10.0 before 23.10.22, from 23.04.0 before 23.04.27, from 22.10.0 before 22.10.29.

AI-Powered Analysis

AILast updated: 07/12/2025, 02:18:33 UTC

Technical Analysis

CVE-2025-4648 is a high-severity vulnerability affecting multiple recent versions of Centreon web, a widely used IT infrastructure monitoring software. The vulnerability is categorized under CWE-494, which involves the download of code without integrity checks. Specifically, this flaw allows a user with elevated privileges to perform a reflected Cross-Site Scripting (XSS) attack by manipulating the content of an SVG media file during a submit request. The vulnerability exists in Centreon web versions from 22.10.0 up to but not including 22.10.29, 23.04.0 up to 23.04.27, 23.10.0 up to 23.10.22, 24.04.0 up to 24.04.11, and 24.10.0 up to 24.10.5. The root cause is the lack of integrity verification when downloading or processing SVG media content, which allows malicious script injection. The CVSS v3.1 base score is 8.4, reflecting high impact with network attack vector, low attack complexity, required high privileges, required user interaction, and scope change. The vulnerability impacts confidentiality, integrity, and availability, as an attacker could execute arbitrary scripts in the context of the Centreon web application, potentially leading to session hijacking, privilege escalation, or disruption of monitoring services. No known exploits are currently reported in the wild, but the vulnerability is publicly disclosed and patched versions are available, though no direct patch links were provided in the source data.

Potential Impact

For European organizations, the impact of CVE-2025-4648 is significant due to Centreon's widespread use in IT infrastructure monitoring across various sectors including government, finance, healthcare, and critical infrastructure. Exploitation could allow attackers to execute malicious scripts within the Centreon web interface, leading to unauthorized access to sensitive monitoring data, manipulation of alerts, or disruption of monitoring capabilities. This could result in delayed detection of network or system failures, increased risk of data breaches, and potential cascading effects on operational technology environments. Given the high privileges required, the threat is more relevant to insider threats or attackers who have already compromised user credentials. However, the network-exploitable nature means that lateral movement within a network could lead to exploitation. The reflected XSS could also be leveraged in targeted phishing campaigns against administrators. The compromise of monitoring systems can undermine trust in security operations and incident response, which is critical for compliance with European data protection regulations such as GDPR and NIS Directive.

Mitigation Recommendations

European organizations should immediately verify their Centreon web versions and upgrade to the fixed releases beyond the affected versions (e.g., 22.10.29, 23.04.27, 23.10.22, 24.04.11, 24.10.5 or later). In the absence of immediate patching, organizations should restrict access to the Centreon web interface to trusted networks and users only, implementing strict network segmentation and multi-factor authentication for all privileged accounts. Additionally, input validation and sanitization controls should be reviewed and enhanced for SVG media uploads or submissions. Monitoring and logging of Centreon web activities should be increased to detect anomalous behavior indicative of exploitation attempts. Security teams should conduct targeted phishing awareness campaigns to reduce the risk of social engineering attacks that could facilitate exploitation. Finally, organizations should consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block reflected XSS payloads targeting Centreon web endpoints.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Centreon
Date Reserved
2025-05-13T09:32:38.704Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9816c4522896dcbd666d

Added to database: 5/21/2025, 9:08:38 AM

Last enriched: 7/12/2025, 2:18:33 AM

Last updated: 7/28/2025, 6:05:40 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats