Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67833: n/a

0
Medium
VulnerabilityCVE-2025-67833cvecve-2025-67833
Published: Wed Jan 14 2026 (01/14/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

Paessler PRTG Network Monitor before 25.4.114 allows XSS by an unauthenticated attacker via the tag parameter.

AI-Powered Analysis

AILast updated: 01/14/2026, 19:09:08 UTC

Technical Analysis

CVE-2025-67833 is a security vulnerability identified in Paessler PRTG Network Monitor, a widely used network monitoring solution. The flaw exists in versions prior to 25.4.114 and involves a cross-site scripting (XSS) issue exploitable via the 'tag' parameter. An unauthenticated attacker can craft a specially designed request containing malicious JavaScript code in the 'tag' parameter, which the application fails to properly sanitize or encode before reflecting it back in the web interface. This vulnerability enables attackers to execute arbitrary scripts in the context of the victim's browser session. Potential consequences include session hijacking, theft of sensitive information, unauthorized command execution within the PRTG interface, and the ability to manipulate monitoring data or configurations. Since no authentication is required, attackers can exploit this remotely without prior access, increasing the attack surface. Although no public exploits have been reported yet, the vulnerability's presence in a critical monitoring tool makes it a significant risk. The lack of a CVSS score suggests the need for an independent severity assessment. The vulnerability highlights the importance of secure input handling and output encoding in web applications, especially those managing critical infrastructure.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial. PRTG Network Monitor is commonly used to oversee network health, performance, and availability across various sectors including finance, healthcare, manufacturing, and government. Exploitation could allow attackers to hijack sessions of network administrators, manipulate monitoring data, or disrupt alerting mechanisms, potentially delaying detection of other attacks or outages. This can lead to compromised network integrity, unauthorized access to sensitive operational data, and reduced availability of monitoring services. In critical infrastructure environments, such disruptions could have cascading effects on service delivery and compliance with regulatory requirements such as GDPR. The unauthenticated nature of the exploit increases risk, as attackers do not need credentials to initiate attacks. Although no active exploitation is currently known, the vulnerability presents a clear threat vector that could be leveraged in targeted attacks against European enterprises and public sector organizations.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize upgrading Paessler PRTG Network Monitor to version 25.4.114 or later as soon as the patch is available. In the interim, organizations should implement web application firewall (WAF) rules to detect and block suspicious requests containing malicious scripts in the 'tag' parameter. Network segmentation and strict access controls on the PRTG management interface can reduce exposure. Monitoring logs for unusual or malformed requests targeting the 'tag' parameter can help identify attempted exploitation. Additionally, organizations should review and harden their input validation and output encoding practices within any custom integrations or extensions of PRTG. Security awareness training for administrators about the risks of XSS and safe browsing practices can reduce the impact of potential attacks. Finally, maintaining an incident response plan that includes scenarios involving monitoring system compromise will improve readiness.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-12T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6967e9c5f809b25a98cd9f38

Added to database: 1/14/2026, 7:08:53 PM

Last enriched: 1/14/2026, 7:09:08 PM

Last updated: 1/14/2026, 8:10:37 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats