Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67834: n/a

0
Medium
VulnerabilityCVE-2025-67834cvecve-2025-67834
Published: Wed Jan 14 2026 (01/14/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-67834 is a medium-severity cross-site scripting (XSS) vulnerability in Paessler PRTG Network Monitor versions before 25. 4. 114. An unauthenticated attacker can exploit this vulnerability via the 'filter' parameter, potentially injecting malicious scripts. The vulnerability impacts confidentiality and integrity but does not affect availability. Exploitation requires no privileges but does require user interaction to trigger the XSS payload. No known exploits are currently in the wild, and no patches have been linked yet. European organizations using vulnerable PRTG versions may face risks of session hijacking, credential theft, or unauthorized actions through injected scripts. Mitigation involves updating to version 25. 4.

AI-Powered Analysis

AILast updated: 01/21/2026, 20:42:03 UTC

Technical Analysis

CVE-2025-67834 is a cross-site scripting (XSS) vulnerability identified in Paessler PRTG Network Monitor, a widely used network monitoring tool. The vulnerability exists in versions prior to 25.4.114 and is triggered via the 'filter' parameter, which fails to properly sanitize user input. This allows an unauthenticated attacker to inject malicious JavaScript code that executes in the context of the victim's browser when they interact with the affected parameter. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS v3.1 score is 5.4 (medium), with an attack vector of network (remote), low attack complexity, no privileges required, but requiring user interaction to trigger the payload. The impact affects confidentiality and integrity by potentially allowing session hijacking, theft of sensitive information, or unauthorized actions performed on behalf of the user. Availability is not impacted. No known exploits have been reported in the wild, and no official patches have been linked yet, though the fixed version is identified as 25.4.114. The vulnerability's presence in a network monitoring tool is concerning as it could be leveraged to compromise monitoring dashboards, potentially leading to further network reconnaissance or lateral movement.

Potential Impact

For European organizations, this vulnerability poses risks primarily to the confidentiality and integrity of network monitoring data and user sessions. Successful exploitation could lead to session hijacking, allowing attackers to impersonate legitimate users and access sensitive monitoring information or manipulate monitoring configurations. This could result in undetected network issues or false alerts, impacting operational security. Since PRTG is often used in critical infrastructure sectors such as energy, telecommunications, and finance, exploitation could indirectly affect service reliability and trustworthiness. The requirement for user interaction means phishing or social engineering could be used to trigger the attack. The lack of availability impact reduces the risk of direct denial-of-service but does not diminish the potential for stealthy compromise. Organizations relying heavily on PRTG for network visibility should consider this vulnerability a significant risk to their security posture.

Mitigation Recommendations

1. Upgrade Paessler PRTG Network Monitor to version 25.4.114 or later as soon as the patch is available to ensure the vulnerability is remediated. 2. Until patching is possible, implement strict input validation and output encoding on the 'filter' parameter at the web application or proxy level to neutralize malicious scripts. 3. Deploy or update Web Application Firewalls (WAFs) with rules specifically targeting XSS payloads, focusing on the 'filter' parameter in PRTG URLs. 4. Educate users about the risks of clicking on suspicious links or interacting with untrusted content that could trigger XSS attacks. 5. Monitor network traffic and logs for unusual activity related to PRTG web interfaces, including unexpected parameter values or repeated access attempts. 6. Restrict access to the PRTG web interface to trusted networks or VPNs to reduce exposure to unauthenticated attackers. 7. Conduct regular security assessments and penetration testing focusing on web interface vulnerabilities to detect similar issues proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-12T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6967e9c5f809b25a98cd9f3c

Added to database: 1/14/2026, 7:08:53 PM

Last enriched: 1/21/2026, 8:42:03 PM

Last updated: 2/5/2026, 2:25:45 AM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats