Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-69848: n/a

0
Medium
VulnerabilityCVE-2025-69848cvecve-2025-69848
Published: Tue Feb 03 2026 (02/03/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

NetBox is an open-source infrastructure resource modeling and IP address management platform. A reflected cross-site scripting (XSS) vulnerability exists in versions 2.11.0 through 3.7.x in the ProtectedError handling logic, where object names are included in HTML error messages without proper escaping. This allows user-controlled content to be rendered in the web interface when a delete operation fails due to protected relationships, potentially enabling execution of arbitrary client-side code in the context of a privileged user.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/11/2026, 11:17:17 UTC

Technical Analysis

NetBox is an open-source platform widely used for infrastructure resource modeling and IP address management. The vulnerability CVE-2025-69848 is a reflected cross-site scripting (XSS) flaw present in NetBox versions 2.11.0 through 3.7.x within the ProtectedError handling logic. Specifically, when a delete operation fails due to protected relationships, the error message includes object names in the HTML response without proper escaping or sanitization. This improper handling allows an attacker to inject malicious scripts via object names that get reflected back in the error message. When a privileged user views this error message in the web interface, the malicious script executes in their browser context, potentially enabling session hijacking, credential theft, or unauthorized actions within the application. The vulnerability requires the attacker to trick a privileged user into triggering the error message, thus user interaction is necessary. The CVSS 3.1 base score is 5.4, reflecting medium severity with network attack vector, low attack complexity, privileges required, and user interaction needed. The scope is changed due to the potential impact on confidentiality and integrity, but availability is not affected. No public exploits or patches are currently available, indicating the need for proactive mitigation. The vulnerability is classified under CWE-79, which covers cross-site scripting issues.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those relying on NetBox for critical infrastructure management and IP address tracking. Successful exploitation could lead to unauthorized execution of scripts in the context of privileged users, potentially exposing sensitive configuration data, session tokens, or enabling further attacks within the network. This could compromise the confidentiality and integrity of network management operations, leading to misconfigurations or unauthorized changes. Given that NetBox is often used by network administrators and IT teams, the risk extends to operational disruptions and potential lateral movement by attackers. Although availability is not directly impacted, the indirect effects on network stability and trustworthiness of infrastructure data could be severe. The medium severity score suggests that while the vulnerability is not trivial to exploit, the consequences warrant timely remediation to prevent escalation.

Mitigation Recommendations

European organizations should immediately review their NetBox deployments to identify affected versions (2.11.0 through 3.7.x). Since no official patches are currently available, organizations should implement the following mitigations: 1) Apply strict input validation and output encoding on object names in error messages within custom deployments or through web application firewalls (WAF) to block malicious payloads. 2) Limit access to the NetBox web interface to trusted users and networks, enforcing strong authentication and least privilege principles. 3) Educate privileged users about the risk of clicking on untrusted links or triggering deletion operations that could expose them to reflected XSS. 4) Monitor logs for unusual error message triggers or suspicious activity related to delete operations. 5) Consider deploying Content Security Policy (CSP) headers to restrict execution of unauthorized scripts in the browser. 6) Stay alert for official patches or updates from the NetBox project and apply them promptly once released. 7) If feasible, upgrade to a version beyond 3.7.x once a fix is available. These steps go beyond generic advice by focusing on immediate protective controls and user awareness tailored to this vulnerability's exploitation vector.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6982fcd4f9fa50a62f766336

Added to database: 2/4/2026, 8:01:24 AM

Last enriched: 2/11/2026, 11:17:17 AM

Last updated: 3/26/2026, 10:25:16 AM

Views: 84

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses