CVE-2025-5198: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
A flaw was found in Stackrox, where it is vulnerable to Cross-site scripting (XSS) if the script code is included in a small subset of table cells. The only known potential exploit is if the script is included in the name of a Kubernetes “Role” object* that is applied to a secured cluster. This object can be used by a user with access to the cluster or through a compromised third-party product.
AI Analysis
Technical Summary
CVE-2025-5198 is a cross-site scripting (XSS) vulnerability identified in Red Hat Advanced Cluster Security 4, specifically versions 4.4.0 and 4.5.0. The vulnerability stems from improper neutralization of input during web page generation, where malicious script code can be embedded in a limited subset of table cells within the product's user interface. The primary attack vector involves injecting script code into the name field of a Kubernetes Role object, which is then applied to a secured Kubernetes cluster managed by the affected product. Since Kubernetes Role objects define permissions within clusters, an attacker with the ability to create or modify these objects—either through legitimate cluster access or via a compromised third-party integration—can embed malicious scripts. When these scripts are rendered in the web interface, they execute in the context of the user's browser, leading to potential theft of session tokens, unauthorized actions, or other malicious activities typical of XSS attacks. The vulnerability requires user interaction (viewing the affected interface) and has a CVSS 3.1 base score of 5.0, indicating medium severity. The attack complexity is high due to the need for specific conditions, including injection into Role object names and user interaction. No public exploits have been reported to date. The vulnerability affects confidentiality, integrity, and availability to a limited extent, as the impact depends on the privileges of the victim and the attacker's goals.
Potential Impact
The potential impact of CVE-2025-5198 includes unauthorized script execution within the context of the Red Hat Advanced Cluster Security web interface. This can lead to theft of authentication tokens, session hijacking, or execution of unauthorized actions on behalf of the user. While the vulnerability requires an attacker to have the ability to inject malicious Role objects or compromise a third-party product with such access, the risk is significant in environments where multiple users access the management console. The impact on confidentiality is limited to what can be accessed via the web interface session, while integrity and availability could be affected if the attacker uses the XSS to perform unauthorized changes or disrupt cluster management. Organizations relying on Red Hat Advanced Cluster Security for Kubernetes cluster protection could face increased risk of lateral movement or privilege escalation if this vulnerability is exploited in conjunction with other weaknesses. Given the medium CVSS score and the requirement for user interaction, the threat is moderate but should not be underestimated in high-security environments.
Mitigation Recommendations
To mitigate CVE-2025-5198, organizations should immediately upgrade Red Hat Advanced Cluster Security to versions beyond 4.5.0 once patches are released. In the interim, restrict permissions to create or modify Kubernetes Role objects to trusted administrators only, minimizing the risk of malicious Role name injection. Implement strict input validation and sanitization on all user-supplied data fields, especially those rendered in the web interface, to prevent script injection. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in the web console. Monitor audit logs for unusual Role object creation or modification activities. Additionally, isolate the management console network access to trusted IPs and enforce multi-factor authentication to reduce the risk of compromised credentials being used to exploit this vulnerability. Regularly review third-party integrations for security posture, as compromised third-party products could serve as an attack vector. Finally, educate users about the risks of XSS and encourage cautious interaction with management interfaces.
Affected Countries
United States, Germany, Japan, India, United Kingdom, Canada, Australia, France, Netherlands, South Korea
CVE-2025-5198: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Description
A flaw was found in Stackrox, where it is vulnerable to Cross-site scripting (XSS) if the script code is included in a small subset of table cells. The only known potential exploit is if the script is included in the name of a Kubernetes “Role” object* that is applied to a secured cluster. This object can be used by a user with access to the cluster or through a compromised third-party product.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-5198 is a cross-site scripting (XSS) vulnerability identified in Red Hat Advanced Cluster Security 4, specifically versions 4.4.0 and 4.5.0. The vulnerability stems from improper neutralization of input during web page generation, where malicious script code can be embedded in a limited subset of table cells within the product's user interface. The primary attack vector involves injecting script code into the name field of a Kubernetes Role object, which is then applied to a secured Kubernetes cluster managed by the affected product. Since Kubernetes Role objects define permissions within clusters, an attacker with the ability to create or modify these objects—either through legitimate cluster access or via a compromised third-party integration—can embed malicious scripts. When these scripts are rendered in the web interface, they execute in the context of the user's browser, leading to potential theft of session tokens, unauthorized actions, or other malicious activities typical of XSS attacks. The vulnerability requires user interaction (viewing the affected interface) and has a CVSS 3.1 base score of 5.0, indicating medium severity. The attack complexity is high due to the need for specific conditions, including injection into Role object names and user interaction. No public exploits have been reported to date. The vulnerability affects confidentiality, integrity, and availability to a limited extent, as the impact depends on the privileges of the victim and the attacker's goals.
Potential Impact
The potential impact of CVE-2025-5198 includes unauthorized script execution within the context of the Red Hat Advanced Cluster Security web interface. This can lead to theft of authentication tokens, session hijacking, or execution of unauthorized actions on behalf of the user. While the vulnerability requires an attacker to have the ability to inject malicious Role objects or compromise a third-party product with such access, the risk is significant in environments where multiple users access the management console. The impact on confidentiality is limited to what can be accessed via the web interface session, while integrity and availability could be affected if the attacker uses the XSS to perform unauthorized changes or disrupt cluster management. Organizations relying on Red Hat Advanced Cluster Security for Kubernetes cluster protection could face increased risk of lateral movement or privilege escalation if this vulnerability is exploited in conjunction with other weaknesses. Given the medium CVSS score and the requirement for user interaction, the threat is moderate but should not be underestimated in high-security environments.
Mitigation Recommendations
To mitigate CVE-2025-5198, organizations should immediately upgrade Red Hat Advanced Cluster Security to versions beyond 4.5.0 once patches are released. In the interim, restrict permissions to create or modify Kubernetes Role objects to trusted administrators only, minimizing the risk of malicious Role name injection. Implement strict input validation and sanitization on all user-supplied data fields, especially those rendered in the web interface, to prevent script injection. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in the web console. Monitor audit logs for unusual Role object creation or modification activities. Additionally, isolate the management console network access to trusted IPs and enforce multi-factor authentication to reduce the risk of compromised credentials being used to exploit this vulnerability. Regularly review third-party integrations for security posture, as compromised third-party products could serve as an attack vector. Finally, educate users about the risks of XSS and encourage cautious interaction with management interfaces.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- redhat
- Date Reserved
- 2025-05-26T11:35:17.968Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68362775182aa0cae225090f
Added to database: 5/27/2025, 8:58:29 PM
Last enriched: 2/27/2026, 3:07:05 PM
Last updated: 3/26/2026, 9:20:00 AM
Views: 63
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.