Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-57540: n/a

0
Medium
VulnerabilityCVE-2025-57540cvecve-2025-57540
Published: Tue Sep 09 2025 (09/09/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

A stored cross-site scripting (XSS) vulnerability exists in the WebAuthn Relying Party field within the Datacenter configuration of Proxmox Virtual Environment (PVE) 8.4. Authenticated users can inject JavaScript code that is later executed in the browsers of users who view the configuration page, enabling client-side attacks.

AI-Powered Analysis

AILast updated: 09/17/2025, 01:10:11 UTC

Technical Analysis

CVE-2025-57540 is a stored cross-site scripting (XSS) vulnerability identified in the WebAuthn Relying Party field within the Datacenter configuration interface of Proxmox Virtual Environment (PVE) version 8.4. This vulnerability allows authenticated users to inject malicious JavaScript code into the configuration page. When other users access this page, the injected script executes in their browsers, enabling client-side attacks such as session hijacking, credential theft, or further exploitation of the victim's browser environment. The vulnerability is classified under CWE-79, which pertains to improper neutralization of input during web page generation. The CVSS v3.1 base score is 5.4 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), user interaction (UI:R), scope changed (S:C), and impacts on confidentiality and integrity but not availability (C:L/I:L/A:N). No public exploits are currently known, and no patches have been linked yet. The vulnerability requires an authenticated user to inject the payload, and the attack depends on other users viewing the compromised configuration page, which broadens the scope due to the scope change (S:C).

Potential Impact

For European organizations using Proxmox VE 8.4, this vulnerability poses a risk primarily to internal users who have access to the Datacenter configuration interface. Since Proxmox VE is widely used for virtualization and container management in data centers and enterprise environments, exploitation could lead to unauthorized access to sensitive session tokens or credentials, potentially allowing lateral movement within the network. The confidentiality and integrity of user sessions and data could be compromised, leading to data leakage or manipulation. While availability is not directly impacted, the indirect consequences of such client-side attacks could disrupt administrative operations. European organizations with multi-tenant environments or shared administrative consoles are particularly at risk, as the injected scripts could affect multiple users. The requirement for authentication and user interaction limits the attack surface but does not eliminate risk, especially in environments with many administrators or operators. The lack of known exploits suggests limited current exploitation, but the medium severity score indicates that timely mitigation is important to prevent future attacks.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should first verify if they are running Proxmox VE version 8.4 and restrict access to the Datacenter configuration interface to trusted administrators only. Implement strict input validation and sanitization on the WebAuthn Relying Party field to prevent injection of malicious scripts. Until an official patch is released, consider disabling or limiting the use of the WebAuthn feature within the Datacenter configuration if feasible. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the administrative interface. Regularly audit user privileges to ensure only necessary personnel have configuration access. Additionally, educate administrators about the risks of stored XSS and encourage cautious behavior when interacting with configuration pages. Monitor logs for unusual activity related to configuration changes or script injections. Finally, stay updated with Proxmox security advisories for patches or workarounds addressing this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-08-17T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68c05927ffcb452a184a8c17

Added to database: 9/9/2025, 4:43:19 PM

Last enriched: 9/17/2025, 1:10:11 AM

Last updated: 10/30/2025, 2:17:32 PM

Views: 123

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats