Skip to main content

CVE-2025-47189: n/a

Medium
VulnerabilityCVE-2025-47189cvecve-2025-47189
Published: Thu Jul 17 2025 (07/17/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Netwrix Directory Manager (formerly Imanami GroupID) 11.0.0.0 before 11.1.25162.02 allows XSS for authentication error data of certain user flows, a different vulnerability than CVE-2025-54392.

AI-Powered Analysis

AILast updated: 07/25/2025, 00:54:05 UTC

Technical Analysis

CVE-2025-47189 is a cross-site scripting (XSS) vulnerability affecting Netwrix Directory Manager (formerly Imanami GroupID) versions prior to 11.1.25162.02. This vulnerability arises from improper sanitization of authentication error data in certain user flows, allowing an attacker to inject malicious scripts. Unlike the related CVE-2025-54392, this vulnerability specifically targets the handling of authentication error messages. The vulnerability is classified under CWE-79, indicating that it is a classic reflected or stored XSS issue. Exploitation requires no privileges (PR:N) but does require user interaction (UI:R), such as tricking a user into clicking a crafted link or visiting a malicious page that triggers the vulnerable error message display. The attack vector is network-based (AV:N), meaning it can be exploited remotely over the network. The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component, potentially impacting other parts of the system or user sessions. The impact on confidentiality and integrity is low (C:L, I:L), with no impact on availability (A:N). The CVSS v3.1 base score is 6.1, categorizing it as a medium severity vulnerability. Although no known exploits are currently reported in the wild, the vulnerability could be leveraged for session hijacking, phishing, or delivering malicious payloads within the context of the affected application. The lack of an official patch link suggests that remediation may require updating to the fixed version 11.1.25162.02 once available or applying vendor-recommended mitigations.

Potential Impact

For European organizations using Netwrix Directory Manager, this vulnerability poses a risk primarily to the confidentiality and integrity of user sessions and data. Successful exploitation could allow attackers to execute arbitrary scripts in the context of authenticated users, potentially leading to session hijacking, theft of sensitive information, or unauthorized actions within the directory management system. Given that Netwrix Directory Manager is often used for identity and access management, exploitation could indirectly facilitate privilege escalation or lateral movement within enterprise networks. This is particularly concerning for organizations with stringent data protection requirements under GDPR, as any compromise of user credentials or directory data could lead to regulatory penalties and reputational damage. The requirement for user interaction somewhat limits the attack surface but does not eliminate risk, especially in environments where phishing or social engineering attacks are prevalent. The medium severity rating indicates that while the vulnerability is not critical, it should be addressed promptly to prevent potential exploitation.

Mitigation Recommendations

European organizations should prioritize upgrading Netwrix Directory Manager to version 11.1.25162.02 or later once the patch is officially released. In the interim, organizations can implement the following mitigations: 1) Apply strict input validation and output encoding on authentication error messages if custom configurations or web application firewalls (WAFs) are in place; 2) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts within the application context; 3) Educate users about phishing risks and suspicious links to reduce the likelihood of successful social engineering attacks; 4) Monitor logs for unusual authentication error patterns that could indicate attempted exploitation; 5) Restrict access to the Netwrix Directory Manager interface to trusted networks and users using network segmentation and access controls; 6) Use multi-factor authentication (MFA) to reduce the impact of credential theft resulting from XSS attacks. These targeted measures go beyond generic advice by focusing on the specific nature of the vulnerability and the operational context of the affected product.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-05-02T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 687913bba83201eaace6a0a3

Added to database: 7/17/2025, 3:16:11 PM

Last enriched: 7/25/2025, 12:54:05 AM

Last updated: 8/23/2025, 1:17:45 AM

Views: 31

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats