CVE-2025-64999: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Checkmk GmbH Checkmk
Improper neutralization of input in Checkmk versions 2.4.0 before 2.4.0p22, and 2.3.0 before 2.3.0p43 allows an attacker that can manipulate a host's check output to inject malicious JavaScript into the Synthetic Monitoring HTML logs, which can then be accessed via a crafted phishing link.
AI Analysis
Technical Summary
CVE-2025-64999 is a cross-site scripting (XSS) vulnerability classified under CWE-79 affecting Checkmk, a monitoring software widely used for IT infrastructure and synthetic monitoring. The vulnerability exists in Checkmk versions 2.4.0 prior to patch 2.4.0p22 and 2.3.0 prior to patch 2.3.0p43. It stems from improper neutralization of input during web page generation, specifically in the Synthetic Monitoring HTML logs. An attacker with the ability to manipulate a host's check output can inject malicious JavaScript code into these logs. When a user accesses the compromised HTML logs via a crafted phishing link, the injected script executes in the context of the victim's browser. This can lead to session hijacking, credential theft, or further exploitation within the victim's environment. The CVSS 4.0 base score is 7.3 (high), reflecting network attack vector, low attack complexity, partial privileges required, user interaction needed, and high impact on confidentiality, integrity, and availability. Although no exploits are currently known in the wild, the vulnerability poses a significant risk due to the nature of Checkmk's role in monitoring critical systems and the potential for phishing-based delivery. The vulnerability was publicly disclosed in February 2026, with no official patches linked in the provided data, emphasizing the need for immediate vendor engagement and mitigation.
Potential Impact
The vulnerability allows attackers to execute arbitrary JavaScript in the context of users viewing Synthetic Monitoring HTML logs, potentially leading to session hijacking, data theft, or unauthorized actions within the monitoring platform. Given Checkmk’s role in monitoring critical IT infrastructure, exploitation could undermine trust in monitoring data, disrupt incident response, or facilitate lateral movement within networks. The requirement for attacker control over host check output limits exploitation to insiders or compromised hosts, but the phishing vector expands the attack surface to remote users. Organizations relying on Checkmk for infrastructure monitoring, especially in sectors like finance, healthcare, energy, and government, face risks of operational disruption and data breaches. The high CVSS score reflects the broad impact on confidentiality, integrity, and availability. Absence of known exploits suggests a window for proactive defense, but also the potential for future exploitation once details become widely known.
Mitigation Recommendations
Organizations should immediately upgrade Checkmk to versions 2.4.0p22 or 2.3.0p43 or later once patches are available. Until patches are applied, restrict access to Synthetic Monitoring HTML logs to trusted users only and implement network segmentation to limit attacker ability to manipulate host check outputs. Employ strict input validation and output encoding on all user-controllable inputs in monitoring systems. Enhance phishing awareness training to reduce the risk of users clicking malicious links. Monitor logs for unusual modifications to host check outputs and anomalous access patterns to Synthetic Monitoring logs. Consider deploying web application firewalls (WAFs) with custom rules to detect and block XSS payloads targeting Checkmk interfaces. Regularly audit and harden user privileges within Checkmk to minimize the number of users who can alter host check outputs. Engage with the vendor for official patches and security advisories and subscribe to threat intelligence feeds for emerging exploit information.
Affected Countries
United States, Germany, United Kingdom, France, Canada, Australia, Netherlands, Switzerland, Japan, South Korea
CVE-2025-64999: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Checkmk GmbH Checkmk
Description
Improper neutralization of input in Checkmk versions 2.4.0 before 2.4.0p22, and 2.3.0 before 2.3.0p43 allows an attacker that can manipulate a host's check output to inject malicious JavaScript into the Synthetic Monitoring HTML logs, which can then be accessed via a crafted phishing link.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-64999 is a cross-site scripting (XSS) vulnerability classified under CWE-79 affecting Checkmk, a monitoring software widely used for IT infrastructure and synthetic monitoring. The vulnerability exists in Checkmk versions 2.4.0 prior to patch 2.4.0p22 and 2.3.0 prior to patch 2.3.0p43. It stems from improper neutralization of input during web page generation, specifically in the Synthetic Monitoring HTML logs. An attacker with the ability to manipulate a host's check output can inject malicious JavaScript code into these logs. When a user accesses the compromised HTML logs via a crafted phishing link, the injected script executes in the context of the victim's browser. This can lead to session hijacking, credential theft, or further exploitation within the victim's environment. The CVSS 4.0 base score is 7.3 (high), reflecting network attack vector, low attack complexity, partial privileges required, user interaction needed, and high impact on confidentiality, integrity, and availability. Although no exploits are currently known in the wild, the vulnerability poses a significant risk due to the nature of Checkmk's role in monitoring critical systems and the potential for phishing-based delivery. The vulnerability was publicly disclosed in February 2026, with no official patches linked in the provided data, emphasizing the need for immediate vendor engagement and mitigation.
Potential Impact
The vulnerability allows attackers to execute arbitrary JavaScript in the context of users viewing Synthetic Monitoring HTML logs, potentially leading to session hijacking, data theft, or unauthorized actions within the monitoring platform. Given Checkmk’s role in monitoring critical IT infrastructure, exploitation could undermine trust in monitoring data, disrupt incident response, or facilitate lateral movement within networks. The requirement for attacker control over host check output limits exploitation to insiders or compromised hosts, but the phishing vector expands the attack surface to remote users. Organizations relying on Checkmk for infrastructure monitoring, especially in sectors like finance, healthcare, energy, and government, face risks of operational disruption and data breaches. The high CVSS score reflects the broad impact on confidentiality, integrity, and availability. Absence of known exploits suggests a window for proactive defense, but also the potential for future exploitation once details become widely known.
Mitigation Recommendations
Organizations should immediately upgrade Checkmk to versions 2.4.0p22 or 2.3.0p43 or later once patches are available. Until patches are applied, restrict access to Synthetic Monitoring HTML logs to trusted users only and implement network segmentation to limit attacker ability to manipulate host check outputs. Employ strict input validation and output encoding on all user-controllable inputs in monitoring systems. Enhance phishing awareness training to reduce the risk of users clicking malicious links. Monitor logs for unusual modifications to host check outputs and anomalous access patterns to Synthetic Monitoring logs. Consider deploying web application firewalls (WAFs) with custom rules to detect and block XSS payloads targeting Checkmk interfaces. Regularly audit and harden user privileges within Checkmk to minimize the number of users who can alter host check outputs. Engage with the vendor for official patches and security advisories and subscribe to threat intelligence feeds for emerging exploit information.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Checkmk
- Date Reserved
- 2025-11-12T09:16:24.094Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69a02368b7ef31ef0b08990e
Added to database: 2/26/2026, 10:41:44 AM
Last enriched: 3/5/2026, 11:37:11 AM
Last updated: 4/14/2026, 12:16:53 AM
Views: 336
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.