Skip to main content

CVE-2025-53121: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in The OpenNMS Group Horizon

Medium
VulnerabilityCVE-2025-53121cvecve-2025-53121cwe-79
Published: Thu Jun 26 2025 (06/26/2025, 18:51:35 UTC)
Source: CVE Database V5
Vendor/Project: The OpenNMS Group
Product: Horizon

Description

Multiple stored XSS were found on different nodes with unsanitized parameters in OpenMNS Horizon 33.0.8 and versions earlier than 33.1.6 on multiple platforms that allow an attacker to store on database and then inject HTML and/or Javascript on the page. The solution is to upgrade to Horizon 33.1.6, 33.1.7 or Meridian 2024.2.6, 2024.2.7 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet. OpenNMS thanks Fábio Tomé for reporting this issue.

AI-Powered Analysis

AILast updated: 06/26/2025, 19:20:03 UTC

Technical Analysis

CVE-2025-53121 is a medium-severity stored Cross-Site Scripting (XSS) vulnerability affecting The OpenNMS Group's Horizon product, specifically versions 33.0.8 and earlier than 33.1.6. The vulnerability arises due to improper neutralization of input during web page generation (CWE-79), where multiple stored XSS flaws exist on different nodes within the application. Unsanitized parameters are stored in the database and later rendered on web pages without adequate escaping or validation, allowing an attacker to inject malicious HTML or JavaScript code. This injected code executes in the context of the victim’s browser when they access the affected pages, potentially leading to session hijacking, credential theft, unauthorized actions, or distribution of malware. The vulnerability requires low attack complexity but does require some privileges (low privileges) and user interaction, as indicated by the CVSS vector. The vulnerability is intended to be exploited within private networks since Horizon and Meridian are designed for internal deployment and not for direct Internet exposure. The vendor has addressed this issue in Horizon versions 33.1.6 and 33.1.7, as well as Meridian versions 2024.2.6 and 2024.2.7 or newer. No known exploits are currently in the wild, but the presence of stored XSS in a network management platform is concerning due to the potential for lateral movement or privilege escalation within an organization’s infrastructure. The CVSS 4.0 score of 6.9 reflects a medium severity, considering the attack vector is adjacent network, requiring low privileges and user interaction, but with high impact on confidentiality and integrity if exploited.

Potential Impact

For European organizations, this vulnerability poses a significant risk particularly to those using OpenNMS Horizon or Meridian for network management within their private networks. Successful exploitation could allow attackers to execute arbitrary scripts in the context of network administrators or other privileged users, potentially leading to unauthorized access to sensitive network data, manipulation of network monitoring results, or pivoting to other internal systems. Given that Horizon is often used in critical infrastructure monitoring, telecommunications, and enterprise IT environments, exploitation could disrupt operational continuity or lead to data breaches. The impact on confidentiality and integrity is high, as attackers could steal credentials or inject malicious commands. Availability impact is less direct but could occur if attackers manipulate monitoring data or configurations. Since the product is intended for internal use, the threat is more relevant to insider threats or attackers who have gained some foothold in the network rather than remote external attackers. However, misconfigurations exposing Horizon to the Internet would increase risk substantially. Compliance with GDPR and other European data protection regulations means that any breach involving personal or sensitive data could lead to regulatory penalties and reputational damage.

Mitigation Recommendations

European organizations should immediately upgrade affected OpenNMS Horizon installations to version 33.1.6 or later, or Meridian to 2024.2.6 or later, as these versions contain patches for the stored XSS vulnerabilities. Beyond patching, organizations should ensure that Horizon and Meridian instances are strictly isolated within private networks and not exposed directly to the Internet or untrusted networks. Implement network segmentation and access controls to limit which users and systems can reach the management platform. Conduct regular security audits and input validation reviews on custom integrations or plugins that interact with Horizon to detect any additional injection points. Employ Content Security Policy (CSP) headers on the web interface to mitigate the impact of potential XSS exploitation. Monitor logs and user activity for unusual behavior that might indicate exploitation attempts. Train administrators on secure usage practices and the risks of stored XSS. Finally, review and harden authentication and authorization mechanisms to reduce the risk of privilege escalation if an XSS attack is successful.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
OpenNMS
Date Reserved
2025-06-26T17:52:58.600Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 685d99d8ca1063fb8744adee

Added to database: 6/26/2025, 7:04:56 PM

Last enriched: 6/26/2025, 7:20:03 PM

Last updated: 8/15/2025, 7:58:21 PM

Views: 39

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats