CVE-2025-8429: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Centreon Infra Monitoring
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Centreon Infra Monitoring (ACL Action access configuration modules) allows Stored XSS by users with elevated privileges. This issue affects Infra Monitoring: from 24.10.0 before 24.10.13, from 24.04.0 before 24.04.18, from 23.10.0 before 23.10.28.
AI Analysis
Technical Summary
CVE-2025-8429 is a stored Cross-site Scripting (XSS) vulnerability classified under CWE-79 that affects Centreon Infra Monitoring software versions 23.10.0, 24.04.0, and 24.10.0 before their respective patched versions (23.10.28, 24.04.18, and 24.10.13). The vulnerability exists due to improper neutralization of user input during web page generation within the ACL Action access configuration modules. This flaw allows users with elevated privileges to inject malicious scripts that are stored and later executed in the context of other users’ browsers when they access affected pages. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), but demands high privileges (PR:H) and no user interaction (UI:N). The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. The impact is primarily on confidentiality (C:H), as attackers can steal sensitive information such as session cookies or credentials, but it does not affect integrity or availability. Although no known exploits are reported in the wild, the vulnerability poses a significant risk in environments where Centreon Infra Monitoring is used to manage critical infrastructure. The flaw can be leveraged to escalate privileges or facilitate further attacks within the network by compromising administrative sessions or injecting malicious payloads. The vulnerability affects multiple recent versions, indicating a need for widespread patching. Centreon has published patches for the affected versions, but no direct links are provided in the data. The vulnerability’s presence in a monitoring tool used for infrastructure management increases the potential impact on operational security and data confidentiality.
Potential Impact
For European organizations, the impact of CVE-2025-8429 can be significant, particularly for those relying on Centreon Infra Monitoring to oversee critical infrastructure, IT operations, and network health. Successful exploitation could lead to unauthorized disclosure of sensitive monitoring data, administrative credentials, or session tokens, enabling attackers to gain further access to internal systems. This could facilitate lateral movement, espionage, or sabotage within enterprise networks. The confidentiality breach could undermine trust in monitoring data integrity and delay incident response. Although the vulnerability does not directly affect system integrity or availability, the indirect consequences of compromised monitoring tools could disrupt operational awareness and incident management. Organizations in sectors such as energy, telecommunications, finance, and government, which depend heavily on infrastructure monitoring, face elevated risks. The requirement for elevated privileges to exploit the vulnerability somewhat limits the attack surface but also highlights the criticality of securing privileged accounts. Given the interconnected nature of European IT environments and regulatory requirements around data protection (e.g., GDPR), exploitation could also lead to compliance violations and reputational damage.
Mitigation Recommendations
1. Apply official patches from Centreon immediately for all affected versions (23.10.0 before 23.10.28, 24.04.0 before 24.04.18, and 24.10.0 before 24.10.13) once available. 2. Restrict and audit elevated privilege accounts rigorously to minimize the number of users who can exploit this vulnerability. 3. Implement strict input validation and output encoding on all user-supplied data within the ACL Action access configuration modules to prevent script injection. 4. Deploy Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the web application context. 5. Monitor logs for unusual activity related to configuration changes or access patterns indicative of exploitation attempts. 6. Conduct regular security assessments and penetration tests focusing on web application vulnerabilities in monitoring tools. 7. Educate administrators on the risks of stored XSS and the importance of cautious handling of configuration inputs. 8. Consider network segmentation and access controls to limit exposure of the Centreon Infra Monitoring interface to trusted networks and users only.
Affected Countries
France, Germany, United Kingdom, Netherlands, Belgium, Italy, Spain
CVE-2025-8429: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Centreon Infra Monitoring
Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Centreon Infra Monitoring (ACL Action access configuration modules) allows Stored XSS by users with elevated privileges. This issue affects Infra Monitoring: from 24.10.0 before 24.10.13, from 24.04.0 before 24.04.18, from 23.10.0 before 23.10.28.
AI-Powered Analysis
Technical Analysis
CVE-2025-8429 is a stored Cross-site Scripting (XSS) vulnerability classified under CWE-79 that affects Centreon Infra Monitoring software versions 23.10.0, 24.04.0, and 24.10.0 before their respective patched versions (23.10.28, 24.04.18, and 24.10.13). The vulnerability exists due to improper neutralization of user input during web page generation within the ACL Action access configuration modules. This flaw allows users with elevated privileges to inject malicious scripts that are stored and later executed in the context of other users’ browsers when they access affected pages. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), but demands high privileges (PR:H) and no user interaction (UI:N). The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. The impact is primarily on confidentiality (C:H), as attackers can steal sensitive information such as session cookies or credentials, but it does not affect integrity or availability. Although no known exploits are reported in the wild, the vulnerability poses a significant risk in environments where Centreon Infra Monitoring is used to manage critical infrastructure. The flaw can be leveraged to escalate privileges or facilitate further attacks within the network by compromising administrative sessions or injecting malicious payloads. The vulnerability affects multiple recent versions, indicating a need for widespread patching. Centreon has published patches for the affected versions, but no direct links are provided in the data. The vulnerability’s presence in a monitoring tool used for infrastructure management increases the potential impact on operational security and data confidentiality.
Potential Impact
For European organizations, the impact of CVE-2025-8429 can be significant, particularly for those relying on Centreon Infra Monitoring to oversee critical infrastructure, IT operations, and network health. Successful exploitation could lead to unauthorized disclosure of sensitive monitoring data, administrative credentials, or session tokens, enabling attackers to gain further access to internal systems. This could facilitate lateral movement, espionage, or sabotage within enterprise networks. The confidentiality breach could undermine trust in monitoring data integrity and delay incident response. Although the vulnerability does not directly affect system integrity or availability, the indirect consequences of compromised monitoring tools could disrupt operational awareness and incident management. Organizations in sectors such as energy, telecommunications, finance, and government, which depend heavily on infrastructure monitoring, face elevated risks. The requirement for elevated privileges to exploit the vulnerability somewhat limits the attack surface but also highlights the criticality of securing privileged accounts. Given the interconnected nature of European IT environments and regulatory requirements around data protection (e.g., GDPR), exploitation could also lead to compliance violations and reputational damage.
Mitigation Recommendations
1. Apply official patches from Centreon immediately for all affected versions (23.10.0 before 23.10.28, 24.04.0 before 24.04.18, and 24.10.0 before 24.10.13) once available. 2. Restrict and audit elevated privilege accounts rigorously to minimize the number of users who can exploit this vulnerability. 3. Implement strict input validation and output encoding on all user-supplied data within the ACL Action access configuration modules to prevent script injection. 4. Deploy Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the web application context. 5. Monitor logs for unusual activity related to configuration changes or access patterns indicative of exploitation attempts. 6. Conduct regular security assessments and penetration tests focusing on web application vulnerabilities in monitoring tools. 7. Educate administrators on the risks of stored XSS and the importance of cautious handling of configuration inputs. 8. Consider network segmentation and access controls to limit exposure of the Centreon Infra Monitoring interface to trusted networks and users only.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Centreon
- Date Reserved
- 2025-07-31T18:24:05.148Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68ee702c75ce224a0426b924
Added to database: 10/14/2025, 3:45:48 PM
Last enriched: 10/22/2025, 1:13:01 AM
Last updated: 12/3/2025, 3:05:30 AM
Views: 67
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13646: CWE-434 Unrestricted Upload of File with Dangerous Type in wpchill Image Gallery – Photo Grid & Video Gallery
HighCVE-2025-13645: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in wpchill Image Gallery – Photo Grid & Video Gallery
HighCVE-2025-13448: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in anastis CSSIgniter Shortcodes
MediumCVE-2025-55181: Excessive Iteration (CWE-834) in Facebook proxygen
MediumCVE-2025-64778: CWE-798 Use of Hard-coded Credentials in Mirion Medical EC2 Software NMIS BioDose
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.