Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62172: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in home-assistant core

0
Medium
VulnerabilityCVE-2025-62172cvecve-2025-62172cwe-80cwe-79
Published: Tue Oct 14 2025 (10/14/2025, 15:14:09 UTC)
Source: CVE Database V5
Vendor/Project: home-assistant
Product: core

Description

Home Assistant is open source home automation software that puts local control and privacy first. In versions 2025.1.0 through 2025.10.1, the energy dashboard is vulnerable to stored cross-site scripting. An authenticated user can inject malicious JavaScript code into an energy entity's name field, which is then executed when any user hovers over data points in the energy dashboard graph tooltips. The vulnerability exists because entity names containing HTML are not properly sanitized before being rendered in graph tooltips. This could allow an attacker with authentication to execute arbitrary JavaScript in the context of other users' sessions. Additionally, if an energy provider (such as Tibber) supplies a malicious default name for an entity, the vulnerability can be exploited without direct user action when the default name is used. This issue has been patched in version 2025.10.2. No known workarounds exist.

AI-Powered Analysis

AILast updated: 10/14/2025, 15:46:57 UTC

Technical Analysis

CVE-2025-62172 is a stored cross-site scripting vulnerability affecting the Home Assistant core energy dashboard in versions 2025.1.0 through 2025.10.1. The vulnerability stems from improper neutralization of script-related HTML tags (CWE-80 and CWE-79) in the energy entity name field. Authenticated users can inject malicious JavaScript code into this field, which is then rendered unsanitized in the graph tooltips when any user hovers over data points. This flaw allows arbitrary script execution in the context of other users' sessions, potentially compromising session integrity, stealing credentials, or performing unauthorized actions. Notably, if an energy provider such as Tibber supplies a malicious default entity name, the vulnerability can be exploited without direct user input, increasing the attack surface. The vulnerability requires authentication but no user interaction for exploitation once the malicious name is present. The issue was publicly disclosed on October 14, 2025, and patched in version 2025.10.2. No known workarounds exist, and no exploits have been observed in the wild to date. The CVSS 4.0 base score of 5.3 reflects a medium severity, with network attack vector, low attack complexity, and no privileges beyond authentication required.

Potential Impact

For European organizations using Home Assistant for home or building automation, this vulnerability poses a risk of session hijacking, unauthorized command execution, or data theft within the local automation environment. Since Home Assistant is often deployed in smart homes and small business environments, exploitation could lead to privacy breaches or manipulation of automation controls. The risk is elevated if energy providers integrated with Home Assistant supply malicious default entity names, enabling exploitation without direct attacker interaction. This could impact energy management, device control, and user data confidentiality. Although the vulnerability requires authenticated access, many Home Assistant deployments have multiple users or integrations that could be leveraged by attackers. The medium severity score suggests moderate impact, but the potential for lateral movement or escalation within smart home networks could amplify consequences. European organizations relying on Home Assistant for critical automation should consider this a significant security concern, especially given the lack of workarounds and the need to upgrade promptly.

Mitigation Recommendations

The primary mitigation is to upgrade Home Assistant core to version 2025.10.2 or later, where the vulnerability is patched. Organizations should audit user accounts and integrations with energy providers to ensure no malicious entity names exist. Restricting user privileges to minimize who can create or modify energy entities reduces risk. Implement network segmentation to isolate Home Assistant instances from broader enterprise networks to limit lateral movement if exploitation occurs. Monitor logs for unusual changes to entity names or unexpected JavaScript execution patterns. Validate and sanitize all inputs from third-party integrations, especially energy providers, before ingestion. Consider deploying web application firewalls (WAFs) with custom rules to detect and block suspicious script injections in Home Assistant traffic. Educate users on the risks of authenticated XSS and enforce strong authentication controls to prevent unauthorized access. Finally, maintain regular backups and incident response plans tailored to smart home automation environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-10-07T16:12:03.426Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ee6cbc1b3029e3c7e04057

Added to database: 10/14/2025, 3:31:08 PM

Last enriched: 10/14/2025, 3:46:57 PM

Last updated: 10/16/2025, 12:20:10 PM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats