Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-69517: n/a

0
High
VulnerabilityCVE-2025-69517cvecve-2025-69517
Published: Wed Jan 28 2026 (01/28/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

An HTML injection vulnerability in Amidaware Inc Tactical RMM v1.3.1 and earlier allows authenticated users to inject arbitrary HTML content during the creation of a new agent via the POST /api/v3/newagent/ endpoint. The agent_id parameter accepts up to 255 characters and is improperly sanitized using DOMPurify.sanitize() with the html: true option enabled, which fails to adequately filter HTML input. The injected HTML is rendered in the Tactical RMM management panel when an administrator attempts to remove or shut down the affected agent, potentially leading to client-side attacks such as UI manipulation or phishing. NOTE: the Supplier's position is that this has incorrect information.

AI-Powered Analysis

AILast updated: 02/05/2026, 08:26:56 UTC

Technical Analysis

CVE-2025-69517 is an HTML injection vulnerability identified in Amidaware Inc's Tactical RMM software, versions 1.3.1 and earlier. The flaw exists in the POST /api/v3/newagent/ endpoint, specifically in the agent_id parameter, which accepts up to 255 characters and is insufficiently sanitized. The sanitization relies on DOMPurify.sanitize() with the html:true option enabled, which inadvertently allows certain HTML content to bypass filters. As a result, an authenticated user can inject arbitrary HTML code during the creation of a new agent. This malicious HTML is later rendered within the Tactical RMM management panel when an administrator attempts to remove or shut down the compromised agent. The rendered malicious content can lead to client-side attacks such as UI manipulation, phishing, or potentially executing scripts that compromise the administrator's session or credentials. The vulnerability requires the attacker to have valid authentication credentials but does not require additional user interaction beyond the administrator viewing the affected agent. The CVSS v3.1 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, with low attack complexity and no user interaction needed. Although no public exploits are currently known, the vulnerability poses a significant risk in environments where Tactical RMM is used for remote monitoring and management, especially given the privileged access of administrative users. The supplier has disputed some details of the vulnerability, but the technical risk remains substantial. No patches or mitigations have been officially released at the time of publication.

Potential Impact

For European organizations, this vulnerability presents a critical risk due to the privileged nature of Tactical RMM, which is used to manage and monitor IT infrastructure remotely. Successful exploitation could lead to unauthorized access to administrative sessions, manipulation of the management interface, and potential phishing attacks targeting system administrators. This could result in the compromise of sensitive operational data, unauthorized changes to monitored systems, or disruption of IT services. Given the high CVSS score and the ability to affect confidentiality, integrity, and availability, organizations could face operational downtime, data breaches, and regulatory compliance issues under GDPR if personal or sensitive data is exposed. The requirement for authentication limits exposure to insider threats or compromised accounts, but the risk remains significant in environments with many users or weak credential management. Tactical RMM deployments in critical infrastructure sectors such as finance, healthcare, and government within Europe are particularly vulnerable to targeted attacks leveraging this flaw.

Mitigation Recommendations

European organizations should immediately audit their Tactical RMM deployments to identify affected versions (1.3.1 and earlier). Since no official patches are currently available, organizations should implement compensating controls such as restricting access to the new agent creation API endpoint to only highly trusted users and monitoring for unusual agent creation activity. Administrators should be trained to recognize suspicious UI behavior in the management panel and avoid interacting with untrusted agents. Network segmentation and strict access controls should be enforced to limit exposure of the Tactical RMM interface. Implement multi-factor authentication (MFA) for all users with access to Tactical RMM to reduce the risk of credential compromise. Additionally, organizations should consider deploying web application firewalls (WAFs) with custom rules to detect and block suspicious HTML payloads in agent creation requests. Continuous monitoring and logging of administrative actions within Tactical RMM can help detect exploitation attempts. Finally, maintain close communication with Amidaware Inc for updates on official patches or security advisories.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 697a30624623b1157cd4fb18

Added to database: 1/28/2026, 3:50:58 PM

Last enriched: 2/5/2026, 8:26:56 AM

Last updated: 2/8/2026, 3:39:14 AM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats