CVE-2025-53121: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in The OpenNMS Group Horizon
Multiple stored XSS were found on different nodes with unsanitized parameters in OpenMNS Horizon 33.0.8 and versions earlier than 33.1.6 on multiple platforms that allow an attacker to store on database and then inject HTML and/or Javascript on the page. The solution is to upgrade to Horizon 33.1.6, 33.1.7 or Meridian 2024.2.6, 2024.2.7 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet. OpenNMS thanks Fábio Tomé for reporting this issue.
AI Analysis
Technical Summary
CVE-2025-53121 is a medium-severity stored Cross-Site Scripting (XSS) vulnerability affecting The OpenNMS Group's Horizon product, specifically versions 33.0.8 and earlier than 33.1.6. The vulnerability arises due to improper neutralization of input during web page generation (CWE-79), where multiple stored XSS flaws exist on different nodes within the application. Unsanitized parameters are stored in the database and later rendered on web pages without adequate escaping or validation, allowing an attacker to inject malicious HTML or JavaScript code. This injected code executes in the context of the victim’s browser when they access the affected pages, potentially leading to session hijacking, credential theft, unauthorized actions, or distribution of malware. The vulnerability requires low attack complexity but does require some privileges (low privileges) and user interaction, as indicated by the CVSS vector. The vulnerability is intended to be exploited within private networks since Horizon and Meridian are designed for internal deployment and not for direct Internet exposure. The vendor has addressed this issue in Horizon versions 33.1.6 and 33.1.7, as well as Meridian versions 2024.2.6 and 2024.2.7 or newer. No known exploits are currently in the wild, but the presence of stored XSS in a network management platform is concerning due to the potential for lateral movement or privilege escalation within an organization’s infrastructure. The CVSS 4.0 score of 6.9 reflects a medium severity, considering the attack vector is adjacent network, requiring low privileges and user interaction, but with high impact on confidentiality and integrity if exploited.
Potential Impact
For European organizations, this vulnerability poses a significant risk particularly to those using OpenNMS Horizon or Meridian for network management within their private networks. Successful exploitation could allow attackers to execute arbitrary scripts in the context of network administrators or other privileged users, potentially leading to unauthorized access to sensitive network data, manipulation of network monitoring results, or pivoting to other internal systems. Given that Horizon is often used in critical infrastructure monitoring, telecommunications, and enterprise IT environments, exploitation could disrupt operational continuity or lead to data breaches. The impact on confidentiality and integrity is high, as attackers could steal credentials or inject malicious commands. Availability impact is less direct but could occur if attackers manipulate monitoring data or configurations. Since the product is intended for internal use, the threat is more relevant to insider threats or attackers who have gained some foothold in the network rather than remote external attackers. However, misconfigurations exposing Horizon to the Internet would increase risk substantially. Compliance with GDPR and other European data protection regulations means that any breach involving personal or sensitive data could lead to regulatory penalties and reputational damage.
Mitigation Recommendations
European organizations should immediately upgrade affected OpenNMS Horizon installations to version 33.1.6 or later, or Meridian to 2024.2.6 or later, as these versions contain patches for the stored XSS vulnerabilities. Beyond patching, organizations should ensure that Horizon and Meridian instances are strictly isolated within private networks and not exposed directly to the Internet or untrusted networks. Implement network segmentation and access controls to limit which users and systems can reach the management platform. Conduct regular security audits and input validation reviews on custom integrations or plugins that interact with Horizon to detect any additional injection points. Employ Content Security Policy (CSP) headers on the web interface to mitigate the impact of potential XSS exploitation. Monitor logs and user activity for unusual behavior that might indicate exploitation attempts. Train administrators on secure usage practices and the risks of stored XSS. Finally, review and harden authentication and authorization mechanisms to reduce the risk of privilege escalation if an XSS attack is successful.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2025-53121: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in The OpenNMS Group Horizon
Description
Multiple stored XSS were found on different nodes with unsanitized parameters in OpenMNS Horizon 33.0.8 and versions earlier than 33.1.6 on multiple platforms that allow an attacker to store on database and then inject HTML and/or Javascript on the page. The solution is to upgrade to Horizon 33.1.6, 33.1.7 or Meridian 2024.2.6, 2024.2.7 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet. OpenNMS thanks Fábio Tomé for reporting this issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-53121 is a medium-severity stored Cross-Site Scripting (XSS) vulnerability affecting The OpenNMS Group's Horizon product, specifically versions 33.0.8 and earlier than 33.1.6. The vulnerability arises due to improper neutralization of input during web page generation (CWE-79), where multiple stored XSS flaws exist on different nodes within the application. Unsanitized parameters are stored in the database and later rendered on web pages without adequate escaping or validation, allowing an attacker to inject malicious HTML or JavaScript code. This injected code executes in the context of the victim’s browser when they access the affected pages, potentially leading to session hijacking, credential theft, unauthorized actions, or distribution of malware. The vulnerability requires low attack complexity but does require some privileges (low privileges) and user interaction, as indicated by the CVSS vector. The vulnerability is intended to be exploited within private networks since Horizon and Meridian are designed for internal deployment and not for direct Internet exposure. The vendor has addressed this issue in Horizon versions 33.1.6 and 33.1.7, as well as Meridian versions 2024.2.6 and 2024.2.7 or newer. No known exploits are currently in the wild, but the presence of stored XSS in a network management platform is concerning due to the potential for lateral movement or privilege escalation within an organization’s infrastructure. The CVSS 4.0 score of 6.9 reflects a medium severity, considering the attack vector is adjacent network, requiring low privileges and user interaction, but with high impact on confidentiality and integrity if exploited.
Potential Impact
For European organizations, this vulnerability poses a significant risk particularly to those using OpenNMS Horizon or Meridian for network management within their private networks. Successful exploitation could allow attackers to execute arbitrary scripts in the context of network administrators or other privileged users, potentially leading to unauthorized access to sensitive network data, manipulation of network monitoring results, or pivoting to other internal systems. Given that Horizon is often used in critical infrastructure monitoring, telecommunications, and enterprise IT environments, exploitation could disrupt operational continuity or lead to data breaches. The impact on confidentiality and integrity is high, as attackers could steal credentials or inject malicious commands. Availability impact is less direct but could occur if attackers manipulate monitoring data or configurations. Since the product is intended for internal use, the threat is more relevant to insider threats or attackers who have gained some foothold in the network rather than remote external attackers. However, misconfigurations exposing Horizon to the Internet would increase risk substantially. Compliance with GDPR and other European data protection regulations means that any breach involving personal or sensitive data could lead to regulatory penalties and reputational damage.
Mitigation Recommendations
European organizations should immediately upgrade affected OpenNMS Horizon installations to version 33.1.6 or later, or Meridian to 2024.2.6 or later, as these versions contain patches for the stored XSS vulnerabilities. Beyond patching, organizations should ensure that Horizon and Meridian instances are strictly isolated within private networks and not exposed directly to the Internet or untrusted networks. Implement network segmentation and access controls to limit which users and systems can reach the management platform. Conduct regular security audits and input validation reviews on custom integrations or plugins that interact with Horizon to detect any additional injection points. Employ Content Security Policy (CSP) headers on the web interface to mitigate the impact of potential XSS exploitation. Monitor logs and user activity for unusual behavior that might indicate exploitation attempts. Train administrators on secure usage practices and the risks of stored XSS. Finally, review and harden authentication and authorization mechanisms to reduce the risk of privilege escalation if an XSS attack is successful.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- OpenNMS
- Date Reserved
- 2025-06-26T17:52:58.600Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 685d99d8ca1063fb8744adee
Added to database: 6/26/2025, 7:04:56 PM
Last enriched: 6/26/2025, 7:20:03 PM
Last updated: 1/7/2026, 4:18:55 AM
Views: 98
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20893: Origin validation error in Fujitsu Client Computing Limited Fujitsu Security Solution AuthConductor Client Basic V2
HighCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.