Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54893: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Centreon Infra Monitoring

0
Medium
VulnerabilityCVE-2025-54893cvecve-2025-54893cwe-79
Published: Tue Oct 14 2025 (10/14/2025, 15:24:24 UTC)
Source: CVE Database V5
Vendor/Project: Centreon
Product: Infra Monitoring

Description

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Centreon Infra Monitoring (Hosts templates configuration modules) allows Stored XSS by users with elevated privileges. This issue affects Infra Monitoring: from 24.10.0 before 24.10.13, from 24.04.0 before 24.04.18, from 23.10.0 before 23.10.28.

AI-Powered Analysis

AILast updated: 10/14/2025, 15:55:58 UTC

Technical Analysis

CVE-2025-54893 is a stored Cross-site Scripting (XSS) vulnerability classified under CWE-79 affecting Centreon Infra Monitoring software, specifically in the Hosts templates configuration modules. The vulnerability arises from improper neutralization of input during web page generation, allowing malicious scripts to be stored and later executed in the context of other users accessing the application. Exploitation requires a user with elevated privileges to inject the malicious payload, which can then be triggered when other users view the affected pages. The vulnerability affects Centreon Infra Monitoring versions 23.10.0 before 23.10.28, 24.04.0 before 24.04.18, and 24.10.0 before 24.10.13. The CVSS v3.1 score is 6.8 (medium severity), with an attack vector of network (remote), low attack complexity, high privileges required, no user interaction, and a scope change indicating that the impact extends beyond the initially compromised component. The primary impact is on confidentiality, as attackers could steal session cookies or other sensitive data, but integrity and availability are not directly affected. No known exploits are currently reported in the wild, but the vulnerability poses a risk in environments where Centreon Infra Monitoring is used to oversee critical infrastructure. The vulnerability's exploitation could facilitate further attacks such as privilege escalation or lateral movement within an organization’s network.

Potential Impact

For European organizations, the impact of CVE-2025-54893 can be significant, particularly for those relying on Centreon Infra Monitoring for critical infrastructure and IT operations monitoring. Successful exploitation could lead to unauthorized disclosure of sensitive information, including session tokens and administrative credentials, enabling attackers to impersonate privileged users. This could result in unauthorized configuration changes, data leakage, or further compromise of the monitoring environment. Given Centreon's role in infrastructure monitoring, disruption or manipulation of monitoring data could impair incident detection and response capabilities, indirectly affecting availability and operational integrity. The vulnerability's requirement for elevated privileges limits exposure to insider threats or attackers who have already gained some level of access, but it remains a critical concern in environments with multiple administrators or shared privileged accounts. European organizations in sectors such as energy, telecommunications, finance, and government, which depend heavily on reliable monitoring solutions, could face increased risk of espionage, sabotage, or compliance violations if this vulnerability is exploited.

Mitigation Recommendations

To mitigate CVE-2025-54893, European organizations should: 1) Immediately plan and apply the official patches from Centreon once they are released for versions 23.10.28, 24.04.18, and 24.10.13 or later. 2) Restrict elevated privileges strictly to trusted personnel and enforce the principle of least privilege to reduce the risk of malicious input injection. 3) Implement strong input validation and sanitization on all user inputs within the Hosts templates configuration modules to prevent injection of malicious scripts. 4) Deploy Content Security Policies (CSP) to limit the execution of unauthorized scripts within the web application context. 5) Monitor logs and user activities for suspicious behavior indicative of attempted XSS exploitation or privilege misuse. 6) Conduct regular security audits and penetration testing focusing on web application vulnerabilities in the monitoring platform. 7) Educate administrators and privileged users about the risks of XSS and safe handling of configuration inputs. 8) Consider network segmentation and access controls to isolate the monitoring system from less trusted network zones to limit exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Centreon
Date Reserved
2025-07-31T18:22:28.421Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee702c75ce224a0426b914

Added to database: 10/14/2025, 3:45:48 PM

Last enriched: 10/14/2025, 3:55:58 PM

Last updated: 10/15/2025, 10:01:00 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats