Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63735: n/a

0
Unknown
VulnerabilityCVE-2025-63735cvecve-2025-63735
Published: Tue Nov 25 2025 (11/25/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

A reflected Cross site scripting (XSS) vulnerability in Ruckus Unleashed 200.13.6.1.319 via the name parameter to the the captive-portal endpoint selfguestpass/guestAccessSubmit.jsp.

AI-Powered Analysis

AILast updated: 11/25/2025, 21:39:01 UTC

Technical Analysis

CVE-2025-63735 is a reflected Cross-Site Scripting (XSS) vulnerability identified in the Ruckus Unleashed wireless access point firmware version 200.13.6.1.319. The vulnerability exists in the captive portal endpoint selfguestpass/guestAccessSubmit.jsp, specifically via the 'name' parameter. Reflected XSS occurs when malicious input sent by an attacker is immediately reflected in the server's response without proper sanitization or encoding, allowing the execution of arbitrary JavaScript in the context of the victim's browser. This can lead to various attack scenarios including session hijacking, theft of cookies or credentials, defacement, or redirection to malicious websites. The vulnerability does not require authentication, making it accessible to unauthenticated attackers who can lure victims into clicking crafted URLs. Although no public exploits have been reported yet, the presence of this vulnerability in a captive portal—a common feature in guest Wi-Fi networks—raises concerns about the security of users connecting to such networks. The lack of a CVSS score indicates that the vulnerability is newly published and pending further assessment. The absence of patches at the time of publication suggests that users should apply interim mitigations. Given the widespread use of Ruckus Unleashed devices in enterprise and public Wi-Fi deployments, this vulnerability could be leveraged to compromise user trust and network security.

Potential Impact

For European organizations, this vulnerability could lead to significant risks, especially in sectors relying on guest Wi-Fi access such as hospitality, education, healthcare, and retail. Attackers exploiting this XSS flaw could steal session cookies or credentials from users accessing captive portals, potentially gaining unauthorized access to internal resources or sensitive data. The reflected nature of the XSS means attackers must trick users into clicking malicious links, but given the captive portal context, this could be facilitated through phishing or social engineering. Compromise of guest networks could also serve as a pivot point for further attacks within organizational networks if segmentation is weak. Additionally, reputational damage and regulatory consequences under GDPR may arise if personal data is exposed or compromised. The vulnerability could disrupt availability if exploited to inject scripts that cause denial of service or degrade user experience on captive portals.

Mitigation Recommendations

Organizations should monitor Ruckus communications for official patches addressing CVE-2025-63735 and apply them promptly once available. In the interim, administrators should restrict access to the captive portal interface to trusted networks or implement network segmentation to isolate guest traffic from sensitive internal systems. Web application firewalls (WAFs) can be configured to detect and block malicious input patterns targeting the 'name' parameter. Input validation and output encoding should be enforced on the captive portal endpoint to prevent script injection. Educating users about the risks of clicking unknown links in guest Wi-Fi environments can reduce successful exploitation. Logging and monitoring of captive portal access should be enhanced to detect suspicious activity. Finally, consider disabling the captive portal feature temporarily if it is not essential or replacing it with more secure authentication mechanisms.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692621d54ed5c2dbbb064b46

Added to database: 11/25/2025, 9:38:29 PM

Last enriched: 11/25/2025, 9:39:01 PM

Last updated: 11/25/2025, 10:59:22 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats