CVE-2025-61933: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in F5 BIG-IP
A reflected cross-site scripting (XSS) vulnerability exists in an undisclosed page of BIG-IP APM that allows an attacker to run JavaScript in the context of the targeted logged-out user. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
AI Analysis
Technical Summary
CVE-2025-61933 is a reflected cross-site scripting (XSS) vulnerability identified in F5 BIG-IP Access Policy Manager (APM), specifically affecting versions 15.1.0, 16.1.0, 17.1.0, and 17.5.0. The vulnerability arises from improper neutralization of user-supplied input during web page generation, classified under CWE-79. An attacker can craft a malicious URL or payload that, when visited by a logged-out user, executes arbitrary JavaScript in the context of that user's browser. This can lead to theft of sensitive information such as session tokens or credentials, manipulation of web content, or redirection to malicious sites. The vulnerability does not require authentication but does require user interaction (clicking a crafted link). The CVSS v3.1 base score is 6.1, indicating medium severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), scope changed (S:C), and impacts on confidentiality and integrity but not availability (C:L/I:L/A:N). No known exploits have been reported in the wild as of the published date. The vulnerability affects supported versions only; versions that have reached End of Technical Support are excluded from evaluation. Since BIG-IP APM is widely used for secure remote access and access policy enforcement, exploitation could undermine network security by enabling phishing, session hijacking, or unauthorized access. The vulnerability underscores the importance of secure input handling in web applications embedded within critical network infrastructure devices.
Potential Impact
For European organizations, the impact of CVE-2025-61933 can be significant due to the widespread use of F5 BIG-IP APM in enterprise and government networks for secure remote access and application delivery. Successful exploitation could allow attackers to execute malicious scripts in users' browsers, potentially leading to credential theft, session hijacking, or redirection to malicious websites. This compromises confidentiality and integrity of user sessions and sensitive data. Although availability is not directly affected, the breach of trust and potential data leakage can disrupt business operations and damage organizational reputation. Given the role of BIG-IP in perimeter defense and access control, exploitation could facilitate further lateral movement or targeted attacks within networks. European organizations in sectors such as finance, healthcare, telecommunications, and government are particularly at risk due to their reliance on secure access infrastructure. Additionally, regulatory compliance frameworks like GDPR impose strict data protection requirements, and exploitation could lead to legal and financial penalties.
Mitigation Recommendations
1. Apply patches and updates from F5 as soon as they become available for the affected BIG-IP versions. 2. Until patches are released, implement web application firewall (WAF) rules to detect and block malicious payloads targeting the vulnerable endpoints. 3. Conduct thorough input validation and output encoding on all user-supplied data within custom configurations or integrations involving BIG-IP APM. 4. Educate users about the risks of clicking on unsolicited or suspicious links, especially those purporting to be related to access portals. 5. Monitor BIG-IP logs and network traffic for unusual patterns that could indicate exploitation attempts, such as anomalous URL parameters or repeated failed access attempts. 6. Restrict access to BIG-IP management and access portals to trusted IP ranges and enforce multi-factor authentication to reduce exposure. 7. Review and harden access policies to minimize the attack surface exposed to unauthenticated users. 8. Coordinate with incident response teams to prepare for potential phishing or social engineering campaigns leveraging this vulnerability.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden
CVE-2025-61933: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in F5 BIG-IP
Description
A reflected cross-site scripting (XSS) vulnerability exists in an undisclosed page of BIG-IP APM that allows an attacker to run JavaScript in the context of the targeted logged-out user. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
AI-Powered Analysis
Technical Analysis
CVE-2025-61933 is a reflected cross-site scripting (XSS) vulnerability identified in F5 BIG-IP Access Policy Manager (APM), specifically affecting versions 15.1.0, 16.1.0, 17.1.0, and 17.5.0. The vulnerability arises from improper neutralization of user-supplied input during web page generation, classified under CWE-79. An attacker can craft a malicious URL or payload that, when visited by a logged-out user, executes arbitrary JavaScript in the context of that user's browser. This can lead to theft of sensitive information such as session tokens or credentials, manipulation of web content, or redirection to malicious sites. The vulnerability does not require authentication but does require user interaction (clicking a crafted link). The CVSS v3.1 base score is 6.1, indicating medium severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), scope changed (S:C), and impacts on confidentiality and integrity but not availability (C:L/I:L/A:N). No known exploits have been reported in the wild as of the published date. The vulnerability affects supported versions only; versions that have reached End of Technical Support are excluded from evaluation. Since BIG-IP APM is widely used for secure remote access and access policy enforcement, exploitation could undermine network security by enabling phishing, session hijacking, or unauthorized access. The vulnerability underscores the importance of secure input handling in web applications embedded within critical network infrastructure devices.
Potential Impact
For European organizations, the impact of CVE-2025-61933 can be significant due to the widespread use of F5 BIG-IP APM in enterprise and government networks for secure remote access and application delivery. Successful exploitation could allow attackers to execute malicious scripts in users' browsers, potentially leading to credential theft, session hijacking, or redirection to malicious websites. This compromises confidentiality and integrity of user sessions and sensitive data. Although availability is not directly affected, the breach of trust and potential data leakage can disrupt business operations and damage organizational reputation. Given the role of BIG-IP in perimeter defense and access control, exploitation could facilitate further lateral movement or targeted attacks within networks. European organizations in sectors such as finance, healthcare, telecommunications, and government are particularly at risk due to their reliance on secure access infrastructure. Additionally, regulatory compliance frameworks like GDPR impose strict data protection requirements, and exploitation could lead to legal and financial penalties.
Mitigation Recommendations
1. Apply patches and updates from F5 as soon as they become available for the affected BIG-IP versions. 2. Until patches are released, implement web application firewall (WAF) rules to detect and block malicious payloads targeting the vulnerable endpoints. 3. Conduct thorough input validation and output encoding on all user-supplied data within custom configurations or integrations involving BIG-IP APM. 4. Educate users about the risks of clicking on unsolicited or suspicious links, especially those purporting to be related to access portals. 5. Monitor BIG-IP logs and network traffic for unusual patterns that could indicate exploitation attempts, such as anomalous URL parameters or repeated failed access attempts. 6. Restrict access to BIG-IP management and access portals to trusted IP ranges and enforce multi-factor authentication to reduce exposure. 7. Review and harden access policies to minimize the attack surface exposed to unauthenticated users. 8. Coordinate with incident response teams to prepare for potential phishing or social engineering campaigns leveraging this vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- f5
- Date Reserved
- 2025-10-03T23:04:43.561Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68efbf6451297e5c13a0014c
Added to database: 10/15/2025, 3:36:04 PM
Last enriched: 1/7/2026, 7:34:45 PM
Last updated: 1/17/2026, 11:13:52 AM
Views: 112
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15530: Reachable Assertion in Open5GS
MediumCVE-2026-0725: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in cyberlord92 Integrate Dynamics 365 CRM
MediumCVE-2025-8615: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in cubewp1211 CubeWP Framework
MediumCVE-2025-14078: CWE-862 Missing Authorization in shoheitanaka PAYGENT for WooCommerce
MediumCVE-2025-10484: CWE-288 Authentication Bypass Using an Alternate Path or Channel in FmeAddons Registration & Login with Mobile Phone Number for WooCommerce
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.