Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-8428: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Centreon Infra Monitoring

0
Medium
VulnerabilityCVE-2025-8428cvecve-2025-8428cwe-79
Published: Tue Oct 14 2025 (10/14/2025, 14:22:03 UTC)
Source: CVE Database V5
Vendor/Project: Centreon
Product: Infra Monitoring

Description

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Centreon Infra Monitoring (HTTP Loader widget modules) allows Stored XSS.This issue affects Infra Monitoring: from 24.10.0 before 24.10.13, from 24.04.0 before 24.04.18, from 23.10.0 before 23.10.28.

AI-Powered Analysis

AILast updated: 10/14/2025, 14:47:35 UTC

Technical Analysis

CVE-2025-8428 is a stored Cross-site Scripting (XSS) vulnerability classified under CWE-79, affecting Centreon Infra Monitoring's HTTP Loader widget modules. The flaw stems from improper neutralization of user-supplied input during web page generation, which allows malicious scripts to be stored and later executed in the browsers of users who view the affected pages. This vulnerability impacts Centreon Infra Monitoring versions 23.10.0 before 23.10.28, 24.04.0 before 24.04.18, and 24.10.0 before 24.10.13. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), and low privileges (PR:L), but does require user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability can affect resources beyond the vulnerable component. The impact is primarily on confidentiality (C:H), with no impact on integrity (I:N) or availability (A:N). An attacker with legitimate access to the monitoring system could inject malicious JavaScript code into HTTP Loader widgets, which would then execute in the context of other users accessing the monitoring interface. This could lead to session hijacking, theft of sensitive monitoring data, or other malicious actions performed on behalf of the victim user. No public exploits have been reported yet, but the presence of stored XSS in a monitoring platform used in enterprise environments poses a significant risk if exploited. The vulnerability was reserved on July 31, 2025, and published on October 14, 2025. Centreon has not yet provided patch links, but users should expect updates to address this issue promptly.

Potential Impact

For European organizations, the impact of CVE-2025-8428 can be significant, especially for those relying on Centreon Infra Monitoring for critical infrastructure and IT operations monitoring. Exploitation could lead to unauthorized disclosure of sensitive monitoring data, including system statuses, network configurations, and potentially credentials or tokens stored or accessible via the monitoring interface. This could facilitate further attacks such as lateral movement or targeted intrusions. The confidentiality breach could undermine trust in monitoring data integrity, complicate incident response, and expose organizations to regulatory penalties under GDPR if personal data is involved. Although the vulnerability does not affect system integrity or availability directly, the indirect consequences of compromised monitoring systems could disrupt operational awareness and delay detection of other attacks. The requirement for low privileges and user interaction lowers the barrier for exploitation within organizations where multiple users access the monitoring platform, increasing the risk of insider threats or phishing-assisted attacks.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Monitor Centreon’s official channels closely for the release of security patches addressing CVE-2025-8428 and apply them immediately upon availability. 2) Until patches are applied, restrict access to the Centreon Infra Monitoring interface to trusted users and networks, employing network segmentation and VPNs where possible. 3) Implement strict input validation and sanitization on any user-supplied data fields within the monitoring platform, if customization or scripting is allowed. 4) Deploy Content Security Policy (CSP) headers to limit the execution of unauthorized scripts within the monitoring web interface. 5) Educate users about the risks of clicking on suspicious links or interacting with untrusted content within the monitoring environment. 6) Conduct regular security audits and penetration testing focused on web application vulnerabilities in the monitoring infrastructure. 7) Monitor logs and user activity for signs of anomalous behavior that could indicate exploitation attempts. 8) Consider multi-factor authentication (MFA) for accessing the monitoring platform to reduce the risk of compromised credentials being leveraged.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Centreon
Date Reserved
2025-07-31T18:23:59.321Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee5f184c738d5ce3163a21

Added to database: 10/14/2025, 2:32:56 PM

Last enriched: 10/14/2025, 2:47:35 PM

Last updated: 10/16/2025, 12:23:38 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats