Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64999: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Checkmk GmbH Checkmk

0
High
VulnerabilityCVE-2025-64999cvecve-2025-64999cwe-79
Published: Thu Feb 26 2026 (02/26/2026, 10:26:00 UTC)
Source: CVE Database V5
Vendor/Project: Checkmk GmbH
Product: Checkmk

Description

Improper neutralization of input in Checkmk versions 2.4.0 before 2.4.0p22, and 2.3.0 before 2.3.0p43 allows an attacker that can manipulate a host's check output to inject malicious JavaScript into the Synthetic Monitoring HTML logs, which can then be accessed via a crafted phishing link.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/05/2026, 11:37:11 UTC

Technical Analysis

CVE-2025-64999 is a cross-site scripting (XSS) vulnerability classified under CWE-79 affecting Checkmk, a monitoring software widely used for IT infrastructure and synthetic monitoring. The vulnerability exists in Checkmk versions 2.4.0 prior to patch 2.4.0p22 and 2.3.0 prior to patch 2.3.0p43. It stems from improper neutralization of input during web page generation, specifically in the Synthetic Monitoring HTML logs. An attacker with the ability to manipulate a host's check output can inject malicious JavaScript code into these logs. When a user accesses the compromised HTML logs via a crafted phishing link, the injected script executes in the context of the victim's browser. This can lead to session hijacking, credential theft, or further exploitation within the victim's environment. The CVSS 4.0 base score is 7.3 (high), reflecting network attack vector, low attack complexity, partial privileges required, user interaction needed, and high impact on confidentiality, integrity, and availability. Although no exploits are currently known in the wild, the vulnerability poses a significant risk due to the nature of Checkmk's role in monitoring critical systems and the potential for phishing-based delivery. The vulnerability was publicly disclosed in February 2026, with no official patches linked in the provided data, emphasizing the need for immediate vendor engagement and mitigation.

Potential Impact

The vulnerability allows attackers to execute arbitrary JavaScript in the context of users viewing Synthetic Monitoring HTML logs, potentially leading to session hijacking, data theft, or unauthorized actions within the monitoring platform. Given Checkmk’s role in monitoring critical IT infrastructure, exploitation could undermine trust in monitoring data, disrupt incident response, or facilitate lateral movement within networks. The requirement for attacker control over host check output limits exploitation to insiders or compromised hosts, but the phishing vector expands the attack surface to remote users. Organizations relying on Checkmk for infrastructure monitoring, especially in sectors like finance, healthcare, energy, and government, face risks of operational disruption and data breaches. The high CVSS score reflects the broad impact on confidentiality, integrity, and availability. Absence of known exploits suggests a window for proactive defense, but also the potential for future exploitation once details become widely known.

Mitigation Recommendations

Organizations should immediately upgrade Checkmk to versions 2.4.0p22 or 2.3.0p43 or later once patches are available. Until patches are applied, restrict access to Synthetic Monitoring HTML logs to trusted users only and implement network segmentation to limit attacker ability to manipulate host check outputs. Employ strict input validation and output encoding on all user-controllable inputs in monitoring systems. Enhance phishing awareness training to reduce the risk of users clicking malicious links. Monitor logs for unusual modifications to host check outputs and anomalous access patterns to Synthetic Monitoring logs. Consider deploying web application firewalls (WAFs) with custom rules to detect and block XSS payloads targeting Checkmk interfaces. Regularly audit and harden user privileges within Checkmk to minimize the number of users who can alter host check outputs. Engage with the vendor for official patches and security advisories and subscribe to threat intelligence feeds for emerging exploit information.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Checkmk
Date Reserved
2025-11-12T09:16:24.094Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a02368b7ef31ef0b08990e

Added to database: 2/26/2026, 10:41:44 AM

Last enriched: 3/5/2026, 11:37:11 AM

Last updated: 4/14/2026, 12:16:53 AM

Views: 336

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses