Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66359: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Logpoint SIEM

0
High
VulnerabilityCVE-2025-66359cvecve-2025-66359cwe-79
Published: Thu Nov 27 2025 (11/27/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: Logpoint
Product: SIEM

Description

An issue was discovered in Logpoint before 7.7.0. Insufficient input validation and a lack of output escaping in multiple components leads to a cross-site scripting (XSS) vulnerability.

AI-Powered Analysis

AILast updated: 11/28/2025, 00:02:37 UTC

Technical Analysis

CVE-2025-66359 is a cross-site scripting (XSS) vulnerability identified in Logpoint SIEM products prior to version 7.7.0. The root cause is insufficient input validation combined with a lack of proper output escaping in multiple components responsible for web page generation. This flaw allows an attacker to inject malicious scripts that execute in the context of the victim’s browser when viewing affected pages. The vulnerability is remotely exploitable over the network, requires low privileges (authenticated user level), and does not require user interaction, increasing its risk profile. The vulnerability affects confidentiality by potentially exposing sensitive session tokens or credentials, integrity by allowing manipulation of displayed data, and availability by enabling attacks that could disrupt SIEM operations. The CVSS 3.1 score of 8.5 reflects these impacts with a vector indicating network attack vector, high attack complexity, low privileges required, no user interaction, and scope change. Although no known exploits are currently reported in the wild, the nature of XSS vulnerabilities in security monitoring platforms like SIEMs makes this a critical concern. Logpoint SIEM is widely used in enterprise environments for security event monitoring and incident response, making the exploitation of this vulnerability a significant threat to organizational security posture.

Potential Impact

For European organizations, the exploitation of this XSS vulnerability in Logpoint SIEM could lead to severe consequences. Attackers could hijack sessions of security analysts or administrators, gaining unauthorized access to sensitive security logs and configurations. This could result in the exposure of confidential information, manipulation or deletion of security event data, and disruption of incident detection and response capabilities. Organizations in critical sectors such as finance, energy, telecommunications, and government are particularly at risk due to their reliance on SIEM for security monitoring. The compromise of SIEM integrity undermines trust in security alerts and may delay or prevent detection of other attacks. Additionally, the vulnerability’s network accessibility and lack of user interaction requirement increase the likelihood of automated exploitation attempts. The impact extends beyond individual organizations to national cybersecurity resilience, especially in countries with advanced cyber defense infrastructures.

Mitigation Recommendations

1. Apply official patches or updates from Logpoint as soon as they become available, specifically upgrading to version 7.7.0 or later. 2. Until patches are released, implement strict input validation and output encoding on all web interfaces exposed by the SIEM to neutralize potentially malicious input. 3. Deploy Web Application Firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting Logpoint SIEM interfaces. 4. Restrict network access to the SIEM web interface to trusted administrative networks and use VPNs or zero-trust network access solutions to limit exposure. 5. Conduct regular security audits and penetration testing focusing on web interface vulnerabilities. 6. Monitor SIEM logs and network traffic for unusual activities indicative of exploitation attempts, such as anomalous script injections or unexpected user sessions. 7. Educate security personnel about the risks of XSS and ensure they follow best practices for session management and credential protection. 8. Consider implementing Content Security Policy (CSP) headers to reduce the impact of potential XSS attacks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-27T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6928e52bb0d67dda9e89c4dd

Added to database: 11/27/2025, 11:56:27 PM

Last enriched: 11/28/2025, 12:02:37 AM

Last updated: 12/4/2025, 9:47:55 AM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats