CVE-2025-69517: n/a
An HTML injection vulnerability in Amidaware Inc Tactical RMM v1.3.1 and earlier allows authenticated users to inject arbitrary HTML content during the creation of a new agent via the POST /api/v3/newagent/ endpoint. The agent_id parameter accepts up to 255 characters and is improperly sanitized using DOMPurify.sanitize() with the html: true option enabled, which fails to adequately filter HTML input. The injected HTML is rendered in the Tactical RMM management panel when an administrator attempts to remove or shut down the affected agent, potentially leading to client-side attacks such as UI manipulation or phishing. NOTE: the Supplier's position is that this has incorrect information.
AI Analysis
Technical Summary
CVE-2025-69517 is an HTML injection vulnerability identified in Amidaware Inc's Tactical RMM software, versions 1.3.1 and earlier. The flaw exists in the POST /api/v3/newagent/ endpoint, specifically in the agent_id parameter, which accepts up to 255 characters and is insufficiently sanitized. The sanitization relies on DOMPurify.sanitize() with the html:true option enabled, which inadvertently allows certain HTML content to bypass filters. As a result, an authenticated user can inject arbitrary HTML code during the creation of a new agent. This malicious HTML is later rendered within the Tactical RMM management panel when an administrator attempts to remove or shut down the compromised agent. The rendered malicious content can lead to client-side attacks such as UI manipulation, phishing, or potentially executing scripts that compromise the administrator's session or credentials. The vulnerability requires the attacker to have valid authentication credentials but does not require additional user interaction beyond the administrator viewing the affected agent. The CVSS v3.1 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, with low attack complexity and no user interaction needed. Although no public exploits are currently known, the vulnerability poses a significant risk in environments where Tactical RMM is used for remote monitoring and management, especially given the privileged access of administrative users. The supplier has disputed some details of the vulnerability, but the technical risk remains substantial. No patches or mitigations have been officially released at the time of publication.
Potential Impact
For European organizations, this vulnerability presents a critical risk due to the privileged nature of Tactical RMM, which is used to manage and monitor IT infrastructure remotely. Successful exploitation could lead to unauthorized access to administrative sessions, manipulation of the management interface, and potential phishing attacks targeting system administrators. This could result in the compromise of sensitive operational data, unauthorized changes to monitored systems, or disruption of IT services. Given the high CVSS score and the ability to affect confidentiality, integrity, and availability, organizations could face operational downtime, data breaches, and regulatory compliance issues under GDPR if personal or sensitive data is exposed. The requirement for authentication limits exposure to insider threats or compromised accounts, but the risk remains significant in environments with many users or weak credential management. Tactical RMM deployments in critical infrastructure sectors such as finance, healthcare, and government within Europe are particularly vulnerable to targeted attacks leveraging this flaw.
Mitigation Recommendations
European organizations should immediately audit their Tactical RMM deployments to identify affected versions (1.3.1 and earlier). Since no official patches are currently available, organizations should implement compensating controls such as restricting access to the new agent creation API endpoint to only highly trusted users and monitoring for unusual agent creation activity. Administrators should be trained to recognize suspicious UI behavior in the management panel and avoid interacting with untrusted agents. Network segmentation and strict access controls should be enforced to limit exposure of the Tactical RMM interface. Implement multi-factor authentication (MFA) for all users with access to Tactical RMM to reduce the risk of credential compromise. Additionally, organizations should consider deploying web application firewalls (WAFs) with custom rules to detect and block suspicious HTML payloads in agent creation requests. Continuous monitoring and logging of administrative actions within Tactical RMM can help detect exploitation attempts. Finally, maintain close communication with Amidaware Inc for updates on official patches or security advisories.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-69517: n/a
Description
An HTML injection vulnerability in Amidaware Inc Tactical RMM v1.3.1 and earlier allows authenticated users to inject arbitrary HTML content during the creation of a new agent via the POST /api/v3/newagent/ endpoint. The agent_id parameter accepts up to 255 characters and is improperly sanitized using DOMPurify.sanitize() with the html: true option enabled, which fails to adequately filter HTML input. The injected HTML is rendered in the Tactical RMM management panel when an administrator attempts to remove or shut down the affected agent, potentially leading to client-side attacks such as UI manipulation or phishing. NOTE: the Supplier's position is that this has incorrect information.
AI-Powered Analysis
Technical Analysis
CVE-2025-69517 is an HTML injection vulnerability identified in Amidaware Inc's Tactical RMM software, versions 1.3.1 and earlier. The flaw exists in the POST /api/v3/newagent/ endpoint, specifically in the agent_id parameter, which accepts up to 255 characters and is insufficiently sanitized. The sanitization relies on DOMPurify.sanitize() with the html:true option enabled, which inadvertently allows certain HTML content to bypass filters. As a result, an authenticated user can inject arbitrary HTML code during the creation of a new agent. This malicious HTML is later rendered within the Tactical RMM management panel when an administrator attempts to remove or shut down the compromised agent. The rendered malicious content can lead to client-side attacks such as UI manipulation, phishing, or potentially executing scripts that compromise the administrator's session or credentials. The vulnerability requires the attacker to have valid authentication credentials but does not require additional user interaction beyond the administrator viewing the affected agent. The CVSS v3.1 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, with low attack complexity and no user interaction needed. Although no public exploits are currently known, the vulnerability poses a significant risk in environments where Tactical RMM is used for remote monitoring and management, especially given the privileged access of administrative users. The supplier has disputed some details of the vulnerability, but the technical risk remains substantial. No patches or mitigations have been officially released at the time of publication.
Potential Impact
For European organizations, this vulnerability presents a critical risk due to the privileged nature of Tactical RMM, which is used to manage and monitor IT infrastructure remotely. Successful exploitation could lead to unauthorized access to administrative sessions, manipulation of the management interface, and potential phishing attacks targeting system administrators. This could result in the compromise of sensitive operational data, unauthorized changes to monitored systems, or disruption of IT services. Given the high CVSS score and the ability to affect confidentiality, integrity, and availability, organizations could face operational downtime, data breaches, and regulatory compliance issues under GDPR if personal or sensitive data is exposed. The requirement for authentication limits exposure to insider threats or compromised accounts, but the risk remains significant in environments with many users or weak credential management. Tactical RMM deployments in critical infrastructure sectors such as finance, healthcare, and government within Europe are particularly vulnerable to targeted attacks leveraging this flaw.
Mitigation Recommendations
European organizations should immediately audit their Tactical RMM deployments to identify affected versions (1.3.1 and earlier). Since no official patches are currently available, organizations should implement compensating controls such as restricting access to the new agent creation API endpoint to only highly trusted users and monitoring for unusual agent creation activity. Administrators should be trained to recognize suspicious UI behavior in the management panel and avoid interacting with untrusted agents. Network segmentation and strict access controls should be enforced to limit exposure of the Tactical RMM interface. Implement multi-factor authentication (MFA) for all users with access to Tactical RMM to reduce the risk of credential compromise. Additionally, organizations should consider deploying web application firewalls (WAFs) with custom rules to detect and block suspicious HTML payloads in agent creation requests. Continuous monitoring and logging of administrative actions within Tactical RMM can help detect exploitation attempts. Finally, maintain close communication with Amidaware Inc for updates on official patches or security advisories.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2026-01-09T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 697a30624623b1157cd4fb18
Added to database: 1/28/2026, 3:50:58 PM
Last enriched: 2/5/2026, 8:26:56 AM
Last updated: 2/7/2026, 11:04:15 PM
Views: 17
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2115: SQL Injection in itsourcecode Society Management System
MediumCVE-2026-2114: SQL Injection in itsourcecode Society Management System
MediumCVE-2026-25858: CWE-640 Weak Password Recovery Mechanism for Forgotten Password in macrozheng mall
CriticalCVE-2026-25857: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Shenzhen Tenda Technology Tenda G300-F
HighCVE-2025-15564: Divide By Zero in Mapnik
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.