Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67834: n/a

0
High
VulnerabilityCVE-2025-67834cvecve-2025-67834
Published: Wed Jan 14 2026 (01/14/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-67834 is a cross-site scripting (XSS) vulnerability in Paessler PRTG Network Monitor versions prior to 25. 4. 114. It allows an unauthenticated attacker to inject malicious scripts via the 'filter' parameter. Exploitation does not require user authentication, increasing the risk of exploitation. Although no known exploits are currently reported in the wild, the vulnerability could enable attackers to execute arbitrary scripts in the context of the victim's browser. This may lead to session hijacking, credential theft, or further attacks against the network monitoring infrastructure. European organizations using vulnerable versions of PRTG could face risks to confidentiality and integrity of monitoring data. Mitigation requires prompt patching once updates are available and implementing input validation and web application firewalls. Countries with significant deployments of PRTG and critical infrastructure monitoring are at higher risk.

AI-Powered Analysis

AILast updated: 01/14/2026, 19:09:22 UTC

Technical Analysis

CVE-2025-67834 is a security vulnerability identified in Paessler PRTG Network Monitor, a widely used network monitoring solution. The flaw exists in versions prior to 25.4.114 and involves a cross-site scripting (XSS) vulnerability exploitable via the 'filter' parameter. An unauthenticated attacker can craft a specially designed request that injects malicious JavaScript code into the web interface of PRTG. When a legitimate user accesses the affected page, the injected script executes within their browser context. This can lead to theft of session cookies, enabling attackers to impersonate users, or perform unauthorized actions within the monitoring system. Since PRTG is often used to monitor critical network infrastructure, compromise of its interface can have cascading effects on network visibility and control. The vulnerability does not require authentication, lowering the barrier for exploitation. No CVSS score has been assigned yet, and no public exploits are known at this time. The lack of patches or official mitigation details in the provided data suggests organizations should prioritize monitoring vendor advisories and prepare for immediate remediation once patches are released.

Potential Impact

For European organizations, exploitation of this XSS vulnerability could result in unauthorized access to network monitoring dashboards, leading to potential manipulation or disruption of network visibility. Attackers could steal sensitive information such as network topology, device statuses, and alert configurations, undermining confidentiality. Integrity of monitoring data could be compromised by injecting false information or suppressing alerts, potentially delaying detection of real incidents. Availability impact is indirect but possible if attackers leverage the vulnerability to escalate privileges or deploy further attacks. Critical infrastructure operators and enterprises relying heavily on PRTG for network health monitoring are particularly at risk. The unauthenticated nature of the vulnerability increases exposure, especially in environments where the PRTG interface is accessible beyond trusted networks. This could facilitate targeted attacks against European sectors such as finance, energy, telecommunications, and government agencies that depend on PRTG for operational continuity.

Mitigation Recommendations

European organizations should immediately inventory their PRTG Network Monitor deployments to identify affected versions prior to 25.4.114. Until official patches are released, implement strict network segmentation to restrict access to the PRTG web interface only to trusted internal IP addresses. Deploy web application firewalls (WAFs) with custom rules to detect and block suspicious input patterns targeting the 'filter' parameter. Enable Content Security Policy (CSP) headers to mitigate the impact of XSS by restricting script execution sources. Conduct regular security awareness training for administrators to recognize phishing or social engineering attempts that could leverage this vulnerability. Monitor logs for unusual access patterns or injection attempts. Once Paessler releases a patch, prioritize immediate testing and deployment. Additionally, review and harden authentication mechanisms and session management to reduce risk if an attacker gains partial access.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-12T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6967e9c5f809b25a98cd9f3c

Added to database: 1/14/2026, 7:08:53 PM

Last enriched: 1/14/2026, 7:09:22 PM

Last updated: 1/14/2026, 8:12:31 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats