Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61933: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in F5 BIG-IP

0
Medium
VulnerabilityCVE-2025-61933cvecve-2025-61933cwe-79
Published: Wed Oct 15 2025 (10/15/2025, 15:19:49 UTC)
Source: CVE Database V5
Vendor/Project: F5
Product: BIG-IP

Description

A reflected cross-site scripting (XSS) vulnerability exists in an undisclosed page of BIG-IP APM that allows an attacker to run JavaScript in the context of the targeted logged-out user.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 06:03:58 UTC

Technical Analysis

CVE-2025-61933 is a reflected cross-site scripting (XSS) vulnerability classified under CWE-79, found in an undisclosed page of the F5 BIG-IP Access Policy Manager (APM) product. This vulnerability affects multiple versions of BIG-IP (15.1.0, 16.1.0, 17.1.0, and 17.5.0) that are still under technical support. The flaw arises due to improper neutralization of user-supplied input during web page generation, allowing an attacker to inject malicious JavaScript code that executes in the context of a targeted logged-out user. Because the vulnerability is reflected, the malicious payload is delivered via a crafted URL or request that the victim must interact with, such as clicking a link. The CVSS v3.1 score is 6.1, indicating medium severity, with an attack vector of network (remote), low attack complexity, no privileges required, but user interaction is necessary. The scope is changed, meaning the vulnerability can affect resources beyond the vulnerable component. The impact includes limited confidentiality and integrity loss, such as theft of sensitive information or manipulation of client-side scripts, but no impact on availability. No patches or exploits are currently publicly available, and software versions beyond end of technical support are not evaluated. This vulnerability is significant because BIG-IP APM is widely used for secure remote access and application delivery, making it a valuable target for attackers aiming to compromise user sessions or steal credentials.

Potential Impact

The potential impact of CVE-2025-61933 is primarily on confidentiality and integrity. An attacker exploiting this reflected XSS vulnerability can execute arbitrary JavaScript in the context of a logged-out user, potentially stealing sensitive information such as cookies, session tokens, or redirecting users to malicious sites. Although the user is logged out, attackers might leverage this to perform phishing or social engineering attacks to capture credentials or session data upon subsequent login attempts. The vulnerability does not affect system availability, but successful exploitation could undermine trust in the affected BIG-IP APM portal and lead to unauthorized access or data leakage. Organizations relying on BIG-IP for secure access and application delivery could face reputational damage, compliance violations, and increased risk of further compromise if attackers chain this vulnerability with others. Since no known exploits are currently in the wild, the immediate risk is moderate, but the widespread deployment of BIG-IP in enterprise and critical infrastructure environments elevates the potential impact globally.

Mitigation Recommendations

Organizations should implement the following specific mitigation measures: 1) Monitor F5’s official channels for patches addressing CVE-2025-61933 and apply them promptly once released. 2) Until patches are available, deploy web application firewall (WAF) rules to detect and block reflected XSS attack patterns targeting BIG-IP APM interfaces. 3) Conduct thorough input validation and output encoding on all user-supplied data in custom BIG-IP configurations or integrations to reduce injection risks. 4) Educate users about the risks of clicking unsolicited links, especially those purporting to lead to BIG-IP portals. 5) Restrict access to BIG-IP management and APM portals via network segmentation and VPNs to limit exposure. 6) Enable logging and alerting on suspicious web requests to detect potential exploitation attempts early. 7) Review and harden session management policies to minimize the impact of stolen session tokens. These targeted steps go beyond generic advice by focusing on immediate risk reduction and layered defenses specific to BIG-IP environments.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
f5
Date Reserved
2025-10-03T23:04:43.561Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68efbf6451297e5c13a0014c

Added to database: 10/15/2025, 3:36:04 PM

Last enriched: 2/27/2026, 6:03:58 AM

Last updated: 3/26/2026, 9:39:03 AM

Views: 138

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses