CVE-2025-67834: n/a
CVE-2025-67834 is a medium-severity cross-site scripting (XSS) vulnerability in Paessler PRTG Network Monitor versions before 25. 4. 114. An unauthenticated attacker can exploit this vulnerability via the 'filter' parameter, potentially injecting malicious scripts. The vulnerability impacts confidentiality and integrity but does not affect availability. Exploitation requires no privileges but does require user interaction to trigger the XSS payload. No known exploits are currently in the wild, and no patches have been linked yet. European organizations using vulnerable PRTG versions may face risks of session hijacking, credential theft, or unauthorized actions through injected scripts. Mitigation involves updating to version 25. 4.
AI Analysis
Technical Summary
CVE-2025-67834 is a cross-site scripting (XSS) vulnerability identified in Paessler PRTG Network Monitor, a widely used network monitoring tool. The vulnerability exists in versions prior to 25.4.114 and is triggered via the 'filter' parameter, which fails to properly sanitize user input. This allows an unauthenticated attacker to inject malicious JavaScript code that executes in the context of the victim's browser when they interact with the affected parameter. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS v3.1 score is 5.4 (medium), with an attack vector of network (remote), low attack complexity, no privileges required, but requiring user interaction to trigger the payload. The impact affects confidentiality and integrity by potentially allowing session hijacking, theft of sensitive information, or unauthorized actions performed on behalf of the user. Availability is not impacted. No known exploits have been reported in the wild, and no official patches have been linked yet, though the fixed version is identified as 25.4.114. The vulnerability's presence in a network monitoring tool is concerning as it could be leveraged to compromise monitoring dashboards, potentially leading to further network reconnaissance or lateral movement.
Potential Impact
For European organizations, this vulnerability poses risks primarily to the confidentiality and integrity of network monitoring data and user sessions. Successful exploitation could lead to session hijacking, allowing attackers to impersonate legitimate users and access sensitive monitoring information or manipulate monitoring configurations. This could result in undetected network issues or false alerts, impacting operational security. Since PRTG is often used in critical infrastructure sectors such as energy, telecommunications, and finance, exploitation could indirectly affect service reliability and trustworthiness. The requirement for user interaction means phishing or social engineering could be used to trigger the attack. The lack of availability impact reduces the risk of direct denial-of-service but does not diminish the potential for stealthy compromise. Organizations relying heavily on PRTG for network visibility should consider this vulnerability a significant risk to their security posture.
Mitigation Recommendations
1. Upgrade Paessler PRTG Network Monitor to version 25.4.114 or later as soon as the patch is available to ensure the vulnerability is remediated. 2. Until patching is possible, implement strict input validation and output encoding on the 'filter' parameter at the web application or proxy level to neutralize malicious scripts. 3. Deploy or update Web Application Firewalls (WAFs) with rules specifically targeting XSS payloads, focusing on the 'filter' parameter in PRTG URLs. 4. Educate users about the risks of clicking on suspicious links or interacting with untrusted content that could trigger XSS attacks. 5. Monitor network traffic and logs for unusual activity related to PRTG web interfaces, including unexpected parameter values or repeated access attempts. 6. Restrict access to the PRTG web interface to trusted networks or VPNs to reduce exposure to unauthenticated attackers. 7. Conduct regular security assessments and penetration testing focusing on web interface vulnerabilities to detect similar issues proactively.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Italy
CVE-2025-67834: n/a
Description
CVE-2025-67834 is a medium-severity cross-site scripting (XSS) vulnerability in Paessler PRTG Network Monitor versions before 25. 4. 114. An unauthenticated attacker can exploit this vulnerability via the 'filter' parameter, potentially injecting malicious scripts. The vulnerability impacts confidentiality and integrity but does not affect availability. Exploitation requires no privileges but does require user interaction to trigger the XSS payload. No known exploits are currently in the wild, and no patches have been linked yet. European organizations using vulnerable PRTG versions may face risks of session hijacking, credential theft, or unauthorized actions through injected scripts. Mitigation involves updating to version 25. 4.
AI-Powered Analysis
Technical Analysis
CVE-2025-67834 is a cross-site scripting (XSS) vulnerability identified in Paessler PRTG Network Monitor, a widely used network monitoring tool. The vulnerability exists in versions prior to 25.4.114 and is triggered via the 'filter' parameter, which fails to properly sanitize user input. This allows an unauthenticated attacker to inject malicious JavaScript code that executes in the context of the victim's browser when they interact with the affected parameter. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS v3.1 score is 5.4 (medium), with an attack vector of network (remote), low attack complexity, no privileges required, but requiring user interaction to trigger the payload. The impact affects confidentiality and integrity by potentially allowing session hijacking, theft of sensitive information, or unauthorized actions performed on behalf of the user. Availability is not impacted. No known exploits have been reported in the wild, and no official patches have been linked yet, though the fixed version is identified as 25.4.114. The vulnerability's presence in a network monitoring tool is concerning as it could be leveraged to compromise monitoring dashboards, potentially leading to further network reconnaissance or lateral movement.
Potential Impact
For European organizations, this vulnerability poses risks primarily to the confidentiality and integrity of network monitoring data and user sessions. Successful exploitation could lead to session hijacking, allowing attackers to impersonate legitimate users and access sensitive monitoring information or manipulate monitoring configurations. This could result in undetected network issues or false alerts, impacting operational security. Since PRTG is often used in critical infrastructure sectors such as energy, telecommunications, and finance, exploitation could indirectly affect service reliability and trustworthiness. The requirement for user interaction means phishing or social engineering could be used to trigger the attack. The lack of availability impact reduces the risk of direct denial-of-service but does not diminish the potential for stealthy compromise. Organizations relying heavily on PRTG for network visibility should consider this vulnerability a significant risk to their security posture.
Mitigation Recommendations
1. Upgrade Paessler PRTG Network Monitor to version 25.4.114 or later as soon as the patch is available to ensure the vulnerability is remediated. 2. Until patching is possible, implement strict input validation and output encoding on the 'filter' parameter at the web application or proxy level to neutralize malicious scripts. 3. Deploy or update Web Application Firewalls (WAFs) with rules specifically targeting XSS payloads, focusing on the 'filter' parameter in PRTG URLs. 4. Educate users about the risks of clicking on suspicious links or interacting with untrusted content that could trigger XSS attacks. 5. Monitor network traffic and logs for unusual activity related to PRTG web interfaces, including unexpected parameter values or repeated access attempts. 6. Restrict access to the PRTG web interface to trusted networks or VPNs to reduce exposure to unauthenticated attackers. 7. Conduct regular security assessments and penetration testing focusing on web interface vulnerabilities to detect similar issues proactively.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-12-12T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6967e9c5f809b25a98cd9f3c
Added to database: 1/14/2026, 7:08:53 PM
Last enriched: 1/21/2026, 8:42:03 PM
Last updated: 2/5/2026, 2:25:45 AM
Views: 42
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11730: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Zyxel ATP series firmware
HighCVE-2026-1898: Improper Access Controls in WeKan
MediumCVE-2026-1897: Missing Authorization in WeKan
MediumCVE-2026-1896: Improper Access Controls in WeKan
MediumCVE-2025-13192: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in roxnor Popup builder with Gamification, Multi-Step Popups, Page-Level Targeting, and WooCommerce Triggers
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.