CVE-2025-54893: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Centreon Infra Monitoring
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Centreon Infra Monitoring (Hosts templates configuration modules) allows Stored XSS by users with elevated privileges. This issue affects Infra Monitoring: from 24.10.0 before 24.10.13, from 24.04.0 before 24.04.18, from 23.10.0 before 23.10.28.
AI Analysis
Technical Summary
CVE-2025-54893 is a stored Cross-site Scripting (XSS) vulnerability classified under CWE-79 affecting Centreon Infra Monitoring software, specifically in the Hosts templates configuration modules. The vulnerability arises from improper neutralization of input during web page generation, allowing malicious scripts to be stored and later executed in the context of other users accessing the application. Exploitation requires a user with elevated privileges to inject the malicious payload, which can then be triggered when other users view the affected pages. The vulnerability affects Centreon Infra Monitoring versions 23.10.0 before 23.10.28, 24.04.0 before 24.04.18, and 24.10.0 before 24.10.13. The CVSS v3.1 score is 6.8 (medium severity), with an attack vector of network (remote), low attack complexity, high privileges required, no user interaction, and a scope change indicating that the impact extends beyond the initially compromised component. The primary impact is on confidentiality, as attackers could steal session cookies or other sensitive data, but integrity and availability are not directly affected. No known exploits are currently reported in the wild, but the vulnerability poses a risk in environments where Centreon Infra Monitoring is used to oversee critical infrastructure. The vulnerability's exploitation could facilitate further attacks such as privilege escalation or lateral movement within an organization’s network.
Potential Impact
For European organizations, the impact of CVE-2025-54893 can be significant, particularly for those relying on Centreon Infra Monitoring for critical infrastructure and IT operations monitoring. Successful exploitation could lead to unauthorized disclosure of sensitive information, including session tokens and administrative credentials, enabling attackers to impersonate privileged users. This could result in unauthorized configuration changes, data leakage, or further compromise of the monitoring environment. Given Centreon's role in infrastructure monitoring, disruption or manipulation of monitoring data could impair incident detection and response capabilities, indirectly affecting availability and operational integrity. The vulnerability's requirement for elevated privileges limits exposure to insider threats or attackers who have already gained some level of access, but it remains a critical concern in environments with multiple administrators or shared privileged accounts. European organizations in sectors such as energy, telecommunications, finance, and government, which depend heavily on reliable monitoring solutions, could face increased risk of espionage, sabotage, or compliance violations if this vulnerability is exploited.
Mitigation Recommendations
To mitigate CVE-2025-54893, European organizations should: 1) Immediately plan and apply the official patches from Centreon once they are released for versions 23.10.28, 24.04.18, and 24.10.13 or later. 2) Restrict elevated privileges strictly to trusted personnel and enforce the principle of least privilege to reduce the risk of malicious input injection. 3) Implement strong input validation and sanitization on all user inputs within the Hosts templates configuration modules to prevent injection of malicious scripts. 4) Deploy Content Security Policies (CSP) to limit the execution of unauthorized scripts within the web application context. 5) Monitor logs and user activities for suspicious behavior indicative of attempted XSS exploitation or privilege misuse. 6) Conduct regular security audits and penetration testing focusing on web application vulnerabilities in the monitoring platform. 7) Educate administrators and privileged users about the risks of XSS and safe handling of configuration inputs. 8) Consider network segmentation and access controls to isolate the monitoring system from less trusted network zones to limit exposure.
Affected Countries
France, Germany, United Kingdom, Netherlands, Belgium, Italy, Spain
CVE-2025-54893: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Centreon Infra Monitoring
Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Centreon Infra Monitoring (Hosts templates configuration modules) allows Stored XSS by users with elevated privileges. This issue affects Infra Monitoring: from 24.10.0 before 24.10.13, from 24.04.0 before 24.04.18, from 23.10.0 before 23.10.28.
AI-Powered Analysis
Technical Analysis
CVE-2025-54893 is a stored Cross-site Scripting (XSS) vulnerability classified under CWE-79 affecting Centreon Infra Monitoring software, specifically in the Hosts templates configuration modules. The vulnerability arises from improper neutralization of input during web page generation, allowing malicious scripts to be stored and later executed in the context of other users accessing the application. Exploitation requires a user with elevated privileges to inject the malicious payload, which can then be triggered when other users view the affected pages. The vulnerability affects Centreon Infra Monitoring versions 23.10.0 before 23.10.28, 24.04.0 before 24.04.18, and 24.10.0 before 24.10.13. The CVSS v3.1 score is 6.8 (medium severity), with an attack vector of network (remote), low attack complexity, high privileges required, no user interaction, and a scope change indicating that the impact extends beyond the initially compromised component. The primary impact is on confidentiality, as attackers could steal session cookies or other sensitive data, but integrity and availability are not directly affected. No known exploits are currently reported in the wild, but the vulnerability poses a risk in environments where Centreon Infra Monitoring is used to oversee critical infrastructure. The vulnerability's exploitation could facilitate further attacks such as privilege escalation or lateral movement within an organization’s network.
Potential Impact
For European organizations, the impact of CVE-2025-54893 can be significant, particularly for those relying on Centreon Infra Monitoring for critical infrastructure and IT operations monitoring. Successful exploitation could lead to unauthorized disclosure of sensitive information, including session tokens and administrative credentials, enabling attackers to impersonate privileged users. This could result in unauthorized configuration changes, data leakage, or further compromise of the monitoring environment. Given Centreon's role in infrastructure monitoring, disruption or manipulation of monitoring data could impair incident detection and response capabilities, indirectly affecting availability and operational integrity. The vulnerability's requirement for elevated privileges limits exposure to insider threats or attackers who have already gained some level of access, but it remains a critical concern in environments with multiple administrators or shared privileged accounts. European organizations in sectors such as energy, telecommunications, finance, and government, which depend heavily on reliable monitoring solutions, could face increased risk of espionage, sabotage, or compliance violations if this vulnerability is exploited.
Mitigation Recommendations
To mitigate CVE-2025-54893, European organizations should: 1) Immediately plan and apply the official patches from Centreon once they are released for versions 23.10.28, 24.04.18, and 24.10.13 or later. 2) Restrict elevated privileges strictly to trusted personnel and enforce the principle of least privilege to reduce the risk of malicious input injection. 3) Implement strong input validation and sanitization on all user inputs within the Hosts templates configuration modules to prevent injection of malicious scripts. 4) Deploy Content Security Policies (CSP) to limit the execution of unauthorized scripts within the web application context. 5) Monitor logs and user activities for suspicious behavior indicative of attempted XSS exploitation or privilege misuse. 6) Conduct regular security audits and penetration testing focusing on web application vulnerabilities in the monitoring platform. 7) Educate administrators and privileged users about the risks of XSS and safe handling of configuration inputs. 8) Consider network segmentation and access controls to isolate the monitoring system from less trusted network zones to limit exposure.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Centreon
- Date Reserved
- 2025-07-31T18:22:28.421Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68ee702c75ce224a0426b914
Added to database: 10/14/2025, 3:45:48 PM
Last enriched: 10/14/2025, 3:55:58 PM
Last updated: 10/15/2025, 10:01:00 PM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11619: CWE-295 Improper Certificate Validation in Devolutions Devolutions Server
HighCVE-2025-43313: An app may be able to access sensitive user data in Apple macOS
MediumCVE-2025-43282: An app may be able to cause unexpected system termination in Apple iPadOS
MediumCVE-2025-43281: A local attacker may be able to elevate their privileges in Apple macOS
UnknownCVE-2025-43280: Forwarding an email could display remote images in Mail in Lockdown Mode in Apple iOS and iPadOS
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.