CVE-2025-54889: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Centreon Infra Monitoring
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Centreon Infra Monitoring (SNMP traps manufacturer configuration modules) allows Stored XSS by users with elevated privileges. This issue affects Infra Monitoring: from 24.10.0 before 24.10.13, from 24.04.0 before 24.04.18, from 23.10.0 before 23.10.28.
AI Analysis
Technical Summary
CVE-2025-54889 is a stored Cross-site Scripting (XSS) vulnerability classified under CWE-79, affecting Centreon Infra Monitoring software versions 23.10.0 before 23.10.28, 24.04.0 before 24.04.18, and 24.10.0 before 24.10.13. The vulnerability exists in the SNMP traps manufacturer configuration modules, where user input is not properly sanitized or neutralized during web page generation. This flaw allows an attacker with elevated privileges to inject malicious JavaScript code that is stored persistently and executed in the context of other users accessing the affected interface. The vulnerability requires no user interaction to trigger but does require the attacker to have high privileges within the system, limiting the attack surface to trusted users or insiders. The CVSS v3.1 score is 6.8, reflecting a medium severity with a network attack vector, low attack complexity, and no user interaction needed. The impact primarily affects confidentiality, as the injected scripts can steal session cookies or sensitive information, but does not directly affect integrity or availability. No known exploits have been reported in the wild as of the publication date. Centreon Infra Monitoring is widely used in IT infrastructure monitoring, including in critical environments, making this vulnerability a concern for organizations relying on this product for network and system health monitoring. The vulnerability underscores the importance of proper input validation and output encoding in web applications, especially those managing critical infrastructure components.
Potential Impact
For European organizations, the impact of CVE-2025-54889 can be significant in environments where Centreon Infra Monitoring is deployed to oversee critical IT infrastructure and network health. Successful exploitation could lead to unauthorized disclosure of sensitive monitoring data, session hijacking, or further lateral movement within the network if attackers leverage stolen credentials or session tokens. This could undermine trust in monitoring systems, delay incident detection, and potentially facilitate more severe attacks. Confidentiality breaches could expose sensitive configuration details or operational data, which may be leveraged by threat actors targeting critical infrastructure sectors such as energy, telecommunications, finance, and government services. Although the vulnerability does not directly affect system integrity or availability, the indirect consequences of compromised monitoring systems could be severe, including delayed response to outages or attacks. The requirement for elevated privileges limits the risk to insider threats or compromised administrator accounts, but organizations with weak access controls or insufficient privilege management are at higher risk. Given the widespread use of Centreon in Europe, especially in countries with advanced IT infrastructure, the vulnerability poses a moderate but non-negligible threat to operational security.
Mitigation Recommendations
1. Apply patches: Monitor Centreon’s official releases and promptly apply the security updates for versions 23.10.28, 24.04.18, and 24.10.13 or later once available. 2. Restrict elevated privileges: Limit the number of users with high-level access to the SNMP traps manufacturer configuration modules and enforce strict role-based access controls to minimize the attack surface. 3. Input validation and output encoding: If customizations or integrations exist, ensure proper input sanitization and output encoding are implemented to prevent injection of malicious scripts. 4. Web Application Firewall (WAF): Deploy and configure WAFs with rules to detect and block XSS payloads targeting Centreon interfaces. 5. Monitor logs and user activity: Implement enhanced monitoring of administrative actions and anomalous behavior to detect potential exploitation attempts early. 6. Security awareness: Train privileged users on the risks of XSS and the importance of cautious input handling. 7. Network segmentation: Isolate monitoring infrastructure to reduce the impact of any compromise. 8. Incident response readiness: Prepare for potential incidents involving monitoring systems by having clear response plans and backups.
Affected Countries
France, Germany, United Kingdom, Netherlands, Belgium, Switzerland, Italy, Spain, Sweden
CVE-2025-54889: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Centreon Infra Monitoring
Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Centreon Infra Monitoring (SNMP traps manufacturer configuration modules) allows Stored XSS by users with elevated privileges. This issue affects Infra Monitoring: from 24.10.0 before 24.10.13, from 24.04.0 before 24.04.18, from 23.10.0 before 23.10.28.
AI-Powered Analysis
Technical Analysis
CVE-2025-54889 is a stored Cross-site Scripting (XSS) vulnerability classified under CWE-79, affecting Centreon Infra Monitoring software versions 23.10.0 before 23.10.28, 24.04.0 before 24.04.18, and 24.10.0 before 24.10.13. The vulnerability exists in the SNMP traps manufacturer configuration modules, where user input is not properly sanitized or neutralized during web page generation. This flaw allows an attacker with elevated privileges to inject malicious JavaScript code that is stored persistently and executed in the context of other users accessing the affected interface. The vulnerability requires no user interaction to trigger but does require the attacker to have high privileges within the system, limiting the attack surface to trusted users or insiders. The CVSS v3.1 score is 6.8, reflecting a medium severity with a network attack vector, low attack complexity, and no user interaction needed. The impact primarily affects confidentiality, as the injected scripts can steal session cookies or sensitive information, but does not directly affect integrity or availability. No known exploits have been reported in the wild as of the publication date. Centreon Infra Monitoring is widely used in IT infrastructure monitoring, including in critical environments, making this vulnerability a concern for organizations relying on this product for network and system health monitoring. The vulnerability underscores the importance of proper input validation and output encoding in web applications, especially those managing critical infrastructure components.
Potential Impact
For European organizations, the impact of CVE-2025-54889 can be significant in environments where Centreon Infra Monitoring is deployed to oversee critical IT infrastructure and network health. Successful exploitation could lead to unauthorized disclosure of sensitive monitoring data, session hijacking, or further lateral movement within the network if attackers leverage stolen credentials or session tokens. This could undermine trust in monitoring systems, delay incident detection, and potentially facilitate more severe attacks. Confidentiality breaches could expose sensitive configuration details or operational data, which may be leveraged by threat actors targeting critical infrastructure sectors such as energy, telecommunications, finance, and government services. Although the vulnerability does not directly affect system integrity or availability, the indirect consequences of compromised monitoring systems could be severe, including delayed response to outages or attacks. The requirement for elevated privileges limits the risk to insider threats or compromised administrator accounts, but organizations with weak access controls or insufficient privilege management are at higher risk. Given the widespread use of Centreon in Europe, especially in countries with advanced IT infrastructure, the vulnerability poses a moderate but non-negligible threat to operational security.
Mitigation Recommendations
1. Apply patches: Monitor Centreon’s official releases and promptly apply the security updates for versions 23.10.28, 24.04.18, and 24.10.13 or later once available. 2. Restrict elevated privileges: Limit the number of users with high-level access to the SNMP traps manufacturer configuration modules and enforce strict role-based access controls to minimize the attack surface. 3. Input validation and output encoding: If customizations or integrations exist, ensure proper input sanitization and output encoding are implemented to prevent injection of malicious scripts. 4. Web Application Firewall (WAF): Deploy and configure WAFs with rules to detect and block XSS payloads targeting Centreon interfaces. 5. Monitor logs and user activity: Implement enhanced monitoring of administrative actions and anomalous behavior to detect potential exploitation attempts early. 6. Security awareness: Train privileged users on the risks of XSS and the importance of cautious input handling. 7. Network segmentation: Isolate monitoring infrastructure to reduce the impact of any compromise. 8. Incident response readiness: Prepare for potential incidents involving monitoring systems by having clear response plans and backups.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Centreon
- Date Reserved
- 2025-07-31T18:22:28.419Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68ee65b283f5d4e8a43ff594
Added to database: 10/14/2025, 3:01:06 PM
Last enriched: 10/14/2025, 3:16:56 PM
Last updated: 10/14/2025, 4:02:30 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-37149: Vulnerability in Hewlett Packard Enterprise (HPE) ProLiant RL300 Gen11 Server
MediumCVE-2025-8429: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Centreon Infra Monitoring
MediumCVE-2025-62366: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in eladnava mailgen
LowCVE-2025-59921: Information disclosure in Fortinet FortiADC
MediumCVE-2025-57716: Execute unauthorized code or commands in Fortinet FortiClientWindows
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.