Skip to main content

CVE-2025-7618: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in ASUSTOR ADM

Medium
VulnerabilityCVE-2025-7618cvecve-2025-7618cwe-79
Published: Mon Jul 14 2025 (07/14/2025, 10:15:10 UTC)
Source: CVE Database V5
Vendor/Project: ASUSTOR
Product: ADM

Description

A stored Cross-Site Scripting (XSS) vulnerability vulnerability was found in the File Explorer and Text Editor of ADM. An attacker could exploit this vulnerability to inject malicious scripts into the applications, which may then access cookies or other sensitive information retained by the browser and used with the affected applications. Affected products and versions include: from ADM 4.1.0 to ADM 4.3.3.RH61 as well as ADM 5.0.0.RIN1 and earlier, and Text Editor 1.0.0.r112 and earlier.

AI-Powered Analysis

AILast updated: 07/14/2025, 10:46:11 UTC

Technical Analysis

CVE-2025-7618 is a stored Cross-Site Scripting (XSS) vulnerability identified in ASUSTOR's ADM (ASUSTOR Data Master) operating system, specifically affecting the File Explorer and Text Editor applications. The vulnerability arises from improper neutralization of input during web page generation (CWE-79), allowing an attacker to inject malicious scripts that are persistently stored and later executed in the context of the affected web applications. This flaw exists in ADM versions from 4.1.0 up to 4.3.3.RH61, as well as in version 5.0.0.RIN1 and earlier, and in Text Editor version 1.0.0.r112 and earlier. Exploiting this vulnerability does not require authentication but does require user interaction, such as opening or interacting with a maliciously crafted file or interface element within the ADM File Explorer or Text Editor. Once exploited, the injected script can access browser cookies and other sensitive information retained by the browser, potentially leading to session hijacking or unauthorized actions within the ADM environment. The CVSS v4.0 base score is 4.8, reflecting a medium severity level, with attack vector being network-based, low attack complexity, no privileges required, but user interaction necessary. The vulnerability does not affect confidentiality or availability directly but poses a risk to integrity and confidentiality through potential session theft or unauthorized command execution within the ADM web interface. No known public exploits or patches have been reported at the time of publication.

Potential Impact

For European organizations using ASUSTOR ADM devices, particularly those leveraging the File Explorer and Text Editor applications, this vulnerability could lead to unauthorized access to sensitive data and session tokens, potentially allowing attackers to impersonate legitimate users or execute unauthorized commands within the ADM environment. This could compromise the integrity of stored data and the confidentiality of user sessions. Given that ADM is often used for network-attached storage (NAS) in enterprise and SMB environments, exploitation could lead to lateral movement within internal networks or data exfiltration. The requirement for user interaction somewhat limits the attack surface but does not eliminate risk, especially in environments where multiple users access ADM interfaces. The absence of known exploits in the wild reduces immediate risk but does not preclude targeted attacks. European organizations with critical data stored on ASUSTOR devices or integrated ADM systems should consider this vulnerability a moderate risk that could impact business continuity and data security if exploited.

Mitigation Recommendations

1. Immediate mitigation should include updating ASUSTOR ADM to the latest available version once a patch addressing CVE-2025-7618 is released by the vendor. 2. Until patches are available, restrict access to ADM web interfaces to trusted networks and users only, employing network segmentation and firewall rules to limit exposure. 3. Implement strict input validation and sanitization on any custom integrations or scripts interacting with ADM, if applicable. 4. Educate users to avoid opening suspicious files or links within the ADM File Explorer and Text Editor interfaces to reduce the risk of triggering stored XSS payloads. 5. Monitor ADM logs and network traffic for unusual activities that could indicate exploitation attempts. 6. Consider deploying Web Application Firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting ADM interfaces. 7. Employ multi-factor authentication (MFA) on ADM user accounts to reduce the impact of session hijacking. 8. Regularly back up ADM configurations and data to enable recovery in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ASUSTOR1
Date Reserved
2025-07-14T01:44:55.433Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6874dc67a83201eaacc4eaf4

Added to database: 7/14/2025, 10:31:03 AM

Last enriched: 7/14/2025, 10:46:11 AM

Last updated: 7/15/2025, 8:32:35 PM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats