Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62172: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in home-assistant core

0
High
VulnerabilityCVE-2025-62172cvecve-2025-62172cwe-80cwe-79
Published: Tue Oct 14 2025 (10/14/2025, 15:14:09 UTC)
Source: CVE Database V5
Vendor/Project: home-assistant
Product: core

Description

Home Assistant is open source home automation software that puts local control and privacy first. In versions 2025.1.0 through 2025.10.1, the energy dashboard is vulnerable to stored cross-site scripting. An authenticated user can inject malicious JavaScript code into an energy entity's name field, which is then executed when any user hovers over data points in the energy dashboard graph tooltips. The vulnerability exists because entity names containing HTML are not properly sanitized before being rendered in graph tooltips. This could allow an attacker with authentication to execute arbitrary JavaScript in the context of other users' sessions. Additionally, if an energy provider (such as Tibber) supplies a malicious default name for an entity, the vulnerability can be exploited without direct user action when the default name is used. This issue has been patched in version 2025.10.2. No known workarounds exist.

AI-Powered Analysis

AILast updated: 10/21/2025, 20:59:22 UTC

Technical Analysis

CVE-2025-62172 is a stored cross-site scripting (XSS) vulnerability affecting the Home Assistant core energy dashboard component in versions 2025.1.0 through 2025.10.1. The flaw stems from improper neutralization of script-related HTML tags (CWE-80) in the names of energy entities. Specifically, the energy dashboard renders entity names within graph tooltips without adequate sanitization, allowing an authenticated user to inject arbitrary JavaScript code into the entity name field. When other users hover over these data points, the malicious script executes in their browser context, potentially compromising session tokens, stealing sensitive information, or performing actions on behalf of the victim user. Moreover, if an energy provider such as Tibber supplies a malicious default name for an entity, the vulnerability can be triggered without direct user interaction, increasing the attack surface. The vulnerability requires authentication but no additional user interaction beyond hovering over the affected graph tooltip. The CVSS 4.0 base score is 8.5 (high severity), reflecting network attack vector, low attack complexity, no privileges required beyond authentication, and high impact on confidentiality, integrity, and availability. The issue was publicly disclosed on October 14, 2025, and patched in version 2025.10.2. No known exploits are currently in the wild, and no workarounds exist, emphasizing the importance of timely patching.

Potential Impact

For European organizations using Home Assistant for home or building automation, this vulnerability poses significant risks. Exploitation could allow attackers to execute arbitrary JavaScript in the context of other authenticated users, leading to session hijacking, credential theft, unauthorized control of smart devices, or pivoting within internal networks. Given the growing adoption of smart home and building automation technologies in Europe, including in residential, commercial, and critical infrastructure sectors, the potential impact includes privacy violations, operational disruptions, and reputational damage. The ability to exploit the vulnerability without user interaction if a malicious energy provider supplies a compromised default entity name further elevates the threat. Organizations relying on Home Assistant for energy management should consider the risk of lateral movement and data exfiltration, especially where multiple users share access to the dashboard. The lack of known exploits in the wild provides a window for proactive mitigation, but the high severity score underscores the urgency of patching.

Mitigation Recommendations

1. Immediately upgrade all Home Assistant core installations to version 2025.10.2 or later, where the vulnerability is patched. 2. Review and sanitize all existing energy entity names to remove any potentially malicious HTML or script content, especially those imported from external energy providers. 3. Restrict energy dashboard access to trusted authenticated users only and enforce strong authentication mechanisms, such as multi-factor authentication, to reduce the risk of malicious user injection. 4. Monitor logs and user activity for unusual changes to entity names or unexpected dashboard interactions that could indicate exploitation attempts. 5. If possible, disable or limit integration with third-party energy providers until their data inputs can be verified as safe. 6. Educate users about the risks of interacting with untrusted content within the dashboard, particularly hovering over graph tooltips. 7. Implement Content Security Policy (CSP) headers in the Home Assistant web interface to restrict script execution sources, mitigating the impact of any injected scripts. 8. Regularly audit and update all Home Assistant components and dependencies to minimize exposure to similar vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-10-07T16:12:03.426Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ee6cbc1b3029e3c7e04057

Added to database: 10/14/2025, 3:31:08 PM

Last enriched: 10/21/2025, 8:59:22 PM

Last updated: 12/4/2025, 9:42:31 AM

Views: 258

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats