CVE-2025-5198: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
A flaw was found in Stackrox, where it is vulnerable to Cross-site scripting (XSS) if the script code is included in a small subset of table cells. The only known potential exploit is if the script is included in the name of a Kubernetes “Role” object* that is applied to a secured cluster. This object can be used by a user with access to the cluster or through a compromised third-party product.
AI Analysis
Technical Summary
CVE-2025-5198 is a Cross-site Scripting (XSS) vulnerability identified in Red Hat Advanced Cluster Security 4, specifically versions 4.4.0 and 4.5.0. The flaw arises due to improper neutralization of input during web page generation, where script code embedded in certain table cells is not correctly sanitized. The vulnerability is exploitable when malicious script code is included in the name of a Kubernetes Role object applied to a secured cluster. This Role object, if manipulated by an attacker with access to the cluster or via a compromised third-party product, can trigger the XSS vulnerability when viewed through the Stackrox web interface. The vulnerability has a CVSS 3.1 base score of 5.0, indicating a medium severity level. The vector details indicate that the attack requires network access (AV:N), high attack complexity (AC:H), no privileges required (PR:N), user interaction is needed (UI:R), and the impact affects confidentiality, integrity, and availability to a low degree (C:L/I:L/A:L). No known exploits are currently observed in the wild. The vulnerability is significant because Kubernetes Role objects are critical for defining permissions within clusters, and their names are typically trusted inputs. Exploitation could allow an attacker to execute arbitrary scripts in the context of the web interface user, potentially leading to session hijacking, unauthorized actions, or information disclosure within the management console of the cluster security product. This vulnerability highlights the importance of input validation and output encoding in web applications managing Kubernetes security configurations.
Potential Impact
For European organizations using Red Hat Advanced Cluster Security 4, this vulnerability poses a moderate risk. The XSS flaw could be leveraged by attackers to execute malicious scripts in the context of administrators or security personnel accessing the Stackrox interface, potentially leading to session theft, privilege escalation, or unauthorized cluster configuration changes. Given that Kubernetes is widely adopted across European enterprises for container orchestration, and Red Hat's security product is used to manage cluster security, exploitation could undermine the integrity of security monitoring and enforcement. This could result in compromised cluster security posture, data leakage, or disruption of containerized applications. The requirement for user interaction and high attack complexity somewhat limits the attack surface, but insider threats or compromised third-party integrations could facilitate exploitation. The impact on confidentiality, integrity, and availability, while low individually, combined with the critical nature of Kubernetes cluster security, makes this vulnerability a concern for organizations relying on these tools for regulatory compliance and operational security.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should promptly upgrade Red Hat Advanced Cluster Security to a patched version once available. In the interim, organizations should implement strict input validation and sanitization policies for Kubernetes Role object names, ensuring that no script code or potentially malicious characters are allowed. Restrict access to the cluster and the security management interface to trusted personnel only, and monitor for unusual Role object creation or modification activities. Employ Web Application Firewalls (WAFs) with rules to detect and block XSS payloads targeting the Stackrox interface. Additionally, enforce multi-factor authentication (MFA) for accessing the security console to reduce the risk of session hijacking. Regularly audit third-party integrations and plugins for potential compromise vectors that could inject malicious Role objects. Finally, educate administrators and users about the risks of interacting with untrusted inputs within the security management console.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Italy
CVE-2025-5198: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Description
A flaw was found in Stackrox, where it is vulnerable to Cross-site scripting (XSS) if the script code is included in a small subset of table cells. The only known potential exploit is if the script is included in the name of a Kubernetes “Role” object* that is applied to a secured cluster. This object can be used by a user with access to the cluster or through a compromised third-party product.
AI-Powered Analysis
Technical Analysis
CVE-2025-5198 is a Cross-site Scripting (XSS) vulnerability identified in Red Hat Advanced Cluster Security 4, specifically versions 4.4.0 and 4.5.0. The flaw arises due to improper neutralization of input during web page generation, where script code embedded in certain table cells is not correctly sanitized. The vulnerability is exploitable when malicious script code is included in the name of a Kubernetes Role object applied to a secured cluster. This Role object, if manipulated by an attacker with access to the cluster or via a compromised third-party product, can trigger the XSS vulnerability when viewed through the Stackrox web interface. The vulnerability has a CVSS 3.1 base score of 5.0, indicating a medium severity level. The vector details indicate that the attack requires network access (AV:N), high attack complexity (AC:H), no privileges required (PR:N), user interaction is needed (UI:R), and the impact affects confidentiality, integrity, and availability to a low degree (C:L/I:L/A:L). No known exploits are currently observed in the wild. The vulnerability is significant because Kubernetes Role objects are critical for defining permissions within clusters, and their names are typically trusted inputs. Exploitation could allow an attacker to execute arbitrary scripts in the context of the web interface user, potentially leading to session hijacking, unauthorized actions, or information disclosure within the management console of the cluster security product. This vulnerability highlights the importance of input validation and output encoding in web applications managing Kubernetes security configurations.
Potential Impact
For European organizations using Red Hat Advanced Cluster Security 4, this vulnerability poses a moderate risk. The XSS flaw could be leveraged by attackers to execute malicious scripts in the context of administrators or security personnel accessing the Stackrox interface, potentially leading to session theft, privilege escalation, or unauthorized cluster configuration changes. Given that Kubernetes is widely adopted across European enterprises for container orchestration, and Red Hat's security product is used to manage cluster security, exploitation could undermine the integrity of security monitoring and enforcement. This could result in compromised cluster security posture, data leakage, or disruption of containerized applications. The requirement for user interaction and high attack complexity somewhat limits the attack surface, but insider threats or compromised third-party integrations could facilitate exploitation. The impact on confidentiality, integrity, and availability, while low individually, combined with the critical nature of Kubernetes cluster security, makes this vulnerability a concern for organizations relying on these tools for regulatory compliance and operational security.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should promptly upgrade Red Hat Advanced Cluster Security to a patched version once available. In the interim, organizations should implement strict input validation and sanitization policies for Kubernetes Role object names, ensuring that no script code or potentially malicious characters are allowed. Restrict access to the cluster and the security management interface to trusted personnel only, and monitor for unusual Role object creation or modification activities. Employ Web Application Firewalls (WAFs) with rules to detect and block XSS payloads targeting the Stackrox interface. Additionally, enforce multi-factor authentication (MFA) for accessing the security console to reduce the risk of session hijacking. Regularly audit third-party integrations and plugins for potential compromise vectors that could inject malicious Role objects. Finally, educate administrators and users about the risks of interacting with untrusted inputs within the security management console.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- redhat
- Date Reserved
- 2025-05-26T11:35:17.968Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68362775182aa0cae225090f
Added to database: 5/27/2025, 8:58:29 PM
Last enriched: 9/26/2025, 12:39:58 AM
Last updated: 9/27/2025, 12:10:07 AM
Views: 20
Related Threats
CVE-2025-59939: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in LabRedesCefetRJ WeGIA
HighCVE-2025-59936: CWE-116: Improper Encoding or Escaping of Output in nearform get-jwks
CriticalCVE-2025-36144: CWE-532 Insertion of Sensitive Information into Log File in IBM watsonx.data
LowCVE-2025-1862: CWE-434 Unrestricted Upload of File with Dangerous Type in WSO2 WSO2 Enterprise Integrator
MediumCVE-2025-60154: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Jennifer Moss MWW Disclaimer Buttons
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.