Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-5198: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

0
Medium
VulnerabilityCVE-2025-5198cvecve-2025-5198
Published: Tue May 27 2025 (05/27/2025, 20:51:34 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Advanced Cluster Security 4

Description

A flaw was found in Stackrox, where it is vulnerable to Cross-site scripting (XSS) if the script code is included in a small subset of table cells. The only known potential exploit is if the script is included in the name of a Kubernetes “Role” object* that is applied to a secured cluster. This object can be used by a user with access to the cluster or through a compromised third-party product.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 15:07:05 UTC

Technical Analysis

CVE-2025-5198 is a cross-site scripting (XSS) vulnerability identified in Red Hat Advanced Cluster Security 4, specifically versions 4.4.0 and 4.5.0. The vulnerability stems from improper neutralization of input during web page generation, where malicious script code can be embedded in a limited subset of table cells within the product's user interface. The primary attack vector involves injecting script code into the name field of a Kubernetes Role object, which is then applied to a secured Kubernetes cluster managed by the affected product. Since Kubernetes Role objects define permissions within clusters, an attacker with the ability to create or modify these objects—either through legitimate cluster access or via a compromised third-party integration—can embed malicious scripts. When these scripts are rendered in the web interface, they execute in the context of the user's browser, leading to potential theft of session tokens, unauthorized actions, or other malicious activities typical of XSS attacks. The vulnerability requires user interaction (viewing the affected interface) and has a CVSS 3.1 base score of 5.0, indicating medium severity. The attack complexity is high due to the need for specific conditions, including injection into Role object names and user interaction. No public exploits have been reported to date. The vulnerability affects confidentiality, integrity, and availability to a limited extent, as the impact depends on the privileges of the victim and the attacker's goals.

Potential Impact

The potential impact of CVE-2025-5198 includes unauthorized script execution within the context of the Red Hat Advanced Cluster Security web interface. This can lead to theft of authentication tokens, session hijacking, or execution of unauthorized actions on behalf of the user. While the vulnerability requires an attacker to have the ability to inject malicious Role objects or compromise a third-party product with such access, the risk is significant in environments where multiple users access the management console. The impact on confidentiality is limited to what can be accessed via the web interface session, while integrity and availability could be affected if the attacker uses the XSS to perform unauthorized changes or disrupt cluster management. Organizations relying on Red Hat Advanced Cluster Security for Kubernetes cluster protection could face increased risk of lateral movement or privilege escalation if this vulnerability is exploited in conjunction with other weaknesses. Given the medium CVSS score and the requirement for user interaction, the threat is moderate but should not be underestimated in high-security environments.

Mitigation Recommendations

To mitigate CVE-2025-5198, organizations should immediately upgrade Red Hat Advanced Cluster Security to versions beyond 4.5.0 once patches are released. In the interim, restrict permissions to create or modify Kubernetes Role objects to trusted administrators only, minimizing the risk of malicious Role name injection. Implement strict input validation and sanitization on all user-supplied data fields, especially those rendered in the web interface, to prevent script injection. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in the web console. Monitor audit logs for unusual Role object creation or modification activities. Additionally, isolate the management console network access to trusted IPs and enforce multi-factor authentication to reduce the risk of compromised credentials being used to exploit this vulnerability. Regularly review third-party integrations for security posture, as compromised third-party products could serve as an attack vector. Finally, educate users about the risks of XSS and encourage cautious interaction with management interfaces.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-05-26T11:35:17.968Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68362775182aa0cae225090f

Added to database: 5/27/2025, 8:58:29 PM

Last enriched: 2/27/2026, 3:07:05 PM

Last updated: 3/26/2026, 9:20:00 AM

Views: 63

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses