CVE-2025-66359: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Logpoint SIEM
An issue was discovered in Logpoint before 7.7.0. Insufficient input validation and a lack of output escaping in multiple components leads to a cross-site scripting (XSS) vulnerability.
AI Analysis
Technical Summary
CVE-2025-66359 is a cross-site scripting (XSS) vulnerability identified in Logpoint SIEM products prior to version 7.7.0. The root cause is insufficient input validation combined with a lack of proper output escaping in multiple components responsible for web page generation. This flaw allows an attacker to inject malicious scripts that execute in the context of the victim’s browser when viewing affected pages. The vulnerability is remotely exploitable over the network, requires low privileges (authenticated user level), and does not require user interaction, increasing its risk profile. The vulnerability affects confidentiality by potentially exposing sensitive session tokens or credentials, integrity by allowing manipulation of displayed data, and availability by enabling attacks that could disrupt SIEM operations. The CVSS 3.1 score of 8.5 reflects these impacts with a vector indicating network attack vector, high attack complexity, low privileges required, no user interaction, and scope change. Although no known exploits are currently reported in the wild, the nature of XSS vulnerabilities in security monitoring platforms like SIEMs makes this a critical concern. Logpoint SIEM is widely used in enterprise environments for security event monitoring and incident response, making the exploitation of this vulnerability a significant threat to organizational security posture.
Potential Impact
For European organizations, the exploitation of this XSS vulnerability in Logpoint SIEM could lead to severe consequences. Attackers could hijack sessions of security analysts or administrators, gaining unauthorized access to sensitive security logs and configurations. This could result in the exposure of confidential information, manipulation or deletion of security event data, and disruption of incident detection and response capabilities. Organizations in critical sectors such as finance, energy, telecommunications, and government are particularly at risk due to their reliance on SIEM for security monitoring. The compromise of SIEM integrity undermines trust in security alerts and may delay or prevent detection of other attacks. Additionally, the vulnerability’s network accessibility and lack of user interaction requirement increase the likelihood of automated exploitation attempts. The impact extends beyond individual organizations to national cybersecurity resilience, especially in countries with advanced cyber defense infrastructures.
Mitigation Recommendations
1. Apply official patches or updates from Logpoint as soon as they become available, specifically upgrading to version 7.7.0 or later. 2. Until patches are released, implement strict input validation and output encoding on all web interfaces exposed by the SIEM to neutralize potentially malicious input. 3. Deploy Web Application Firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting Logpoint SIEM interfaces. 4. Restrict network access to the SIEM web interface to trusted administrative networks and use VPNs or zero-trust network access solutions to limit exposure. 5. Conduct regular security audits and penetration testing focusing on web interface vulnerabilities. 6. Monitor SIEM logs and network traffic for unusual activities indicative of exploitation attempts, such as anomalous script injections or unexpected user sessions. 7. Educate security personnel about the risks of XSS and ensure they follow best practices for session management and credential protection. 8. Consider implementing Content Security Policy (CSP) headers to reduce the impact of potential XSS attacks.
Affected Countries
Germany, United Kingdom, Netherlands, France, Sweden, Finland, Norway
CVE-2025-66359: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Logpoint SIEM
Description
An issue was discovered in Logpoint before 7.7.0. Insufficient input validation and a lack of output escaping in multiple components leads to a cross-site scripting (XSS) vulnerability.
AI-Powered Analysis
Technical Analysis
CVE-2025-66359 is a cross-site scripting (XSS) vulnerability identified in Logpoint SIEM products prior to version 7.7.0. The root cause is insufficient input validation combined with a lack of proper output escaping in multiple components responsible for web page generation. This flaw allows an attacker to inject malicious scripts that execute in the context of the victim’s browser when viewing affected pages. The vulnerability is remotely exploitable over the network, requires low privileges (authenticated user level), and does not require user interaction, increasing its risk profile. The vulnerability affects confidentiality by potentially exposing sensitive session tokens or credentials, integrity by allowing manipulation of displayed data, and availability by enabling attacks that could disrupt SIEM operations. The CVSS 3.1 score of 8.5 reflects these impacts with a vector indicating network attack vector, high attack complexity, low privileges required, no user interaction, and scope change. Although no known exploits are currently reported in the wild, the nature of XSS vulnerabilities in security monitoring platforms like SIEMs makes this a critical concern. Logpoint SIEM is widely used in enterprise environments for security event monitoring and incident response, making the exploitation of this vulnerability a significant threat to organizational security posture.
Potential Impact
For European organizations, the exploitation of this XSS vulnerability in Logpoint SIEM could lead to severe consequences. Attackers could hijack sessions of security analysts or administrators, gaining unauthorized access to sensitive security logs and configurations. This could result in the exposure of confidential information, manipulation or deletion of security event data, and disruption of incident detection and response capabilities. Organizations in critical sectors such as finance, energy, telecommunications, and government are particularly at risk due to their reliance on SIEM for security monitoring. The compromise of SIEM integrity undermines trust in security alerts and may delay or prevent detection of other attacks. Additionally, the vulnerability’s network accessibility and lack of user interaction requirement increase the likelihood of automated exploitation attempts. The impact extends beyond individual organizations to national cybersecurity resilience, especially in countries with advanced cyber defense infrastructures.
Mitigation Recommendations
1. Apply official patches or updates from Logpoint as soon as they become available, specifically upgrading to version 7.7.0 or later. 2. Until patches are released, implement strict input validation and output encoding on all web interfaces exposed by the SIEM to neutralize potentially malicious input. 3. Deploy Web Application Firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting Logpoint SIEM interfaces. 4. Restrict network access to the SIEM web interface to trusted administrative networks and use VPNs or zero-trust network access solutions to limit exposure. 5. Conduct regular security audits and penetration testing focusing on web interface vulnerabilities. 6. Monitor SIEM logs and network traffic for unusual activities indicative of exploitation attempts, such as anomalous script injections or unexpected user sessions. 7. Educate security personnel about the risks of XSS and ensure they follow best practices for session management and credential protection. 8. Consider implementing Content Security Policy (CSP) headers to reduce the impact of potential XSS attacks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-11-27T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6928e52bb0d67dda9e89c4dd
Added to database: 11/27/2025, 11:56:27 PM
Last enriched: 11/28/2025, 12:02:37 AM
Last updated: 12/4/2025, 9:47:55 AM
Views: 40
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12826: CWE-862 Missing Authorization in webdevstudios Custom Post Type UI
MediumCVE-2025-12782: CWE-862 Missing Authorization in beaverbuilder Beaver Builder Page Builder – Drag and Drop Website Builder
MediumCVE-2025-13513: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codejunkie Clik stats
MediumCVE-2025-11727: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codisto Omnichannel for WooCommerce: Google, Amazon, eBay & Walmart Integration – Powered by Codisto
HighCVE-2025-11379: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in roselldk WebP Express
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.