Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60737: n/a

0
Medium
VulnerabilityCVE-2025-60737cvecve-2025-60737
Published: Thu Nov 20 2025 (11/20/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Cross Site Scripting vulnerability in Ilevia EVE X1 Server Firmware Version<= 4.7.18.0.eden:Logic Version<=6.00 - 2025_07_21 allows a remote attacker to execute arbitrary code via the /index.php component

AI-Powered Analysis

AILast updated: 11/27/2025, 16:32:27 UTC

Technical Analysis

CVE-2025-60737 is a cross-site scripting (XSS) vulnerability identified in the Ilevia EVE X1 Server Firmware versions up to 4.7.18.0.eden and Logic Version up to 6.00 - 2025_07_21. The vulnerability resides in the /index.php component, where insufficient input sanitization allows an attacker to inject malicious scripts. When a victim user accesses the vulnerable page, the injected script executes in their browser context, enabling arbitrary code execution. This can lead to theft of session cookies, redirection to malicious sites, or execution of unauthorized actions within the web application context. The vulnerability requires no authentication but does require user interaction, such as clicking a crafted link or visiting a malicious webpage. The CVSS 3.1 score of 6.1 reflects a medium severity, with network attack vector, low attack complexity, no privileges required, and user interaction needed. The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component, potentially impacting other parts of the system. The primary impacts are on confidentiality and integrity, with no direct availability impact. No public exploits have been reported yet, but the vulnerability is publicly disclosed and should be addressed promptly. The CWE-79 classification confirms this is a classic reflected or stored XSS issue. Given the firmware's role in industrial or server environments, exploitation could facilitate further attacks or data exfiltration.

Potential Impact

For European organizations, especially those operating critical infrastructure or industrial control systems using Ilevia EVE X1 Server Firmware, this vulnerability poses a risk of unauthorized data access and manipulation. Attackers could leverage XSS to hijack user sessions, steal credentials, or perform actions on behalf of legitimate users, potentially leading to data breaches or unauthorized control commands. While availability is not directly impacted, the integrity and confidentiality of sensitive operational data could be compromised. This could disrupt business operations, cause regulatory compliance issues under GDPR due to data leakage, and damage organizational reputation. The risk is heightened in sectors with high reliance on industrial automation and remote management, such as manufacturing, energy, and transportation within Europe.

Mitigation Recommendations

1. Apply firmware updates and patches from Ilevia as soon as they become available to address CVE-2025-60737. 2. Implement strict input validation and output encoding on all web interface components, especially /index.php, to prevent injection of malicious scripts. 3. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 4. Conduct regular security audits and penetration testing focused on web interfaces of industrial devices. 5. Educate users about the risks of clicking untrusted links or opening suspicious web content related to the affected systems. 6. Monitor network traffic and logs for unusual activity indicative of XSS exploitation attempts. 7. Segment and isolate industrial control networks to limit exposure of vulnerable devices to the internet or untrusted networks. 8. Use web application firewalls (WAF) with rules tailored to detect and block XSS payloads targeting the affected firmware.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 691f3714b661599aeb20f321

Added to database: 11/20/2025, 3:43:16 PM

Last enriched: 11/27/2025, 4:32:27 PM

Last updated: 1/7/2026, 5:24:15 AM

Views: 71

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats