CVE-2025-8430: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Centreon Infra Monitoring
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Centreon Infra Monitoring (Commands Connectors configuration modules) allows Stored XSS by users with elevated privileges. This issue affects Infra Monitoring: from 24.10.0 before 24.10.13, from 24.04.0 before 24.04.18, from 23.10.0 before 23.10.28.
AI Analysis
Technical Summary
CVE-2025-8430 is a stored Cross-site Scripting (XSS) vulnerability classified under CWE-79, found in Centreon Infra Monitoring software specifically within the Commands Connectors configuration modules. This vulnerability arises due to improper neutralization of input during web page generation, allowing malicious scripts to be injected and stored by users possessing elevated privileges. When these scripts are later rendered in the web interface, they execute in the context of other users, potentially exposing sensitive information or enabling further attacks. The affected versions include 23.10.0 before 23.10.28, 24.04.0 before 24.04.18, and 24.10.0 before 24.10.13. The CVSS v3.1 score is 6.8, reflecting a medium severity with a vector indicating network attack vector (AV:N), low attack complexity (AC:L), high privileges required (PR:H), no user interaction (UI:N), and a scope change (S:C). The impact is high on confidentiality (C:H) but none on integrity (I:N) or availability (A:N). This means attackers with elevated privileges can inject scripts that may leak sensitive data but cannot alter data or disrupt service. No public exploits are known at this time, but the vulnerability is published and should be addressed promptly. The vulnerability is particularly concerning in environments where Centreon Infra Monitoring is used to oversee critical infrastructure, as attackers could leverage this to escalate access or exfiltrate data through the web interface.
Potential Impact
For European organizations, the impact of CVE-2025-8430 can be significant, especially in sectors relying heavily on Centreon Infra Monitoring for infrastructure and network monitoring such as energy, telecommunications, finance, and government. The vulnerability allows attackers with elevated privileges to inject persistent malicious scripts, which could lead to unauthorized disclosure of sensitive monitoring data, session hijacking, or further exploitation of the monitoring environment. Although integrity and availability are not directly impacted, confidentiality breaches could expose critical operational details or credentials, increasing the risk of subsequent attacks. The requirement for elevated privileges limits the attack surface but does not eliminate risk, as insider threats or compromised privileged accounts could exploit this flaw. Given the interconnected nature of European critical infrastructure, a successful attack could have cascading effects beyond the initial target. Furthermore, compliance with GDPR and other data protection regulations means that data leakage incidents could result in regulatory penalties and reputational damage.
Mitigation Recommendations
To mitigate CVE-2025-8430, European organizations should: 1) Immediately upgrade Centreon Infra Monitoring to the latest patched versions beyond 23.10.28, 24.04.18, or 24.10.13 as applicable. 2) Restrict elevated privileges strictly to trusted administrators and enforce the principle of least privilege to reduce the risk of exploitation. 3) Implement strong authentication and session management controls to prevent unauthorized access to privileged accounts. 4) Conduct regular code reviews and input validation audits on custom configurations or plugins that interact with the Commands Connectors modules. 5) Monitor web application logs for unusual script injection attempts or anomalous behavior indicative of XSS exploitation. 6) Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts within the web interface. 7) Educate administrators about the risks of stored XSS and safe handling of configuration inputs. 8) Consider network segmentation to isolate monitoring infrastructure from less trusted network zones to limit exposure. 9) Prepare incident response plans that include detection and remediation steps for XSS attacks within monitoring tools.
Affected Countries
France, Germany, United Kingdom, Netherlands, Belgium, Italy, Spain, Poland, Sweden
CVE-2025-8430: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Centreon Infra Monitoring
Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Centreon Infra Monitoring (Commands Connectors configuration modules) allows Stored XSS by users with elevated privileges. This issue affects Infra Monitoring: from 24.10.0 before 24.10.13, from 24.04.0 before 24.04.18, from 23.10.0 before 23.10.28.
AI-Powered Analysis
Technical Analysis
CVE-2025-8430 is a stored Cross-site Scripting (XSS) vulnerability classified under CWE-79, found in Centreon Infra Monitoring software specifically within the Commands Connectors configuration modules. This vulnerability arises due to improper neutralization of input during web page generation, allowing malicious scripts to be injected and stored by users possessing elevated privileges. When these scripts are later rendered in the web interface, they execute in the context of other users, potentially exposing sensitive information or enabling further attacks. The affected versions include 23.10.0 before 23.10.28, 24.04.0 before 24.04.18, and 24.10.0 before 24.10.13. The CVSS v3.1 score is 6.8, reflecting a medium severity with a vector indicating network attack vector (AV:N), low attack complexity (AC:L), high privileges required (PR:H), no user interaction (UI:N), and a scope change (S:C). The impact is high on confidentiality (C:H) but none on integrity (I:N) or availability (A:N). This means attackers with elevated privileges can inject scripts that may leak sensitive data but cannot alter data or disrupt service. No public exploits are known at this time, but the vulnerability is published and should be addressed promptly. The vulnerability is particularly concerning in environments where Centreon Infra Monitoring is used to oversee critical infrastructure, as attackers could leverage this to escalate access or exfiltrate data through the web interface.
Potential Impact
For European organizations, the impact of CVE-2025-8430 can be significant, especially in sectors relying heavily on Centreon Infra Monitoring for infrastructure and network monitoring such as energy, telecommunications, finance, and government. The vulnerability allows attackers with elevated privileges to inject persistent malicious scripts, which could lead to unauthorized disclosure of sensitive monitoring data, session hijacking, or further exploitation of the monitoring environment. Although integrity and availability are not directly impacted, confidentiality breaches could expose critical operational details or credentials, increasing the risk of subsequent attacks. The requirement for elevated privileges limits the attack surface but does not eliminate risk, as insider threats or compromised privileged accounts could exploit this flaw. Given the interconnected nature of European critical infrastructure, a successful attack could have cascading effects beyond the initial target. Furthermore, compliance with GDPR and other data protection regulations means that data leakage incidents could result in regulatory penalties and reputational damage.
Mitigation Recommendations
To mitigate CVE-2025-8430, European organizations should: 1) Immediately upgrade Centreon Infra Monitoring to the latest patched versions beyond 23.10.28, 24.04.18, or 24.10.13 as applicable. 2) Restrict elevated privileges strictly to trusted administrators and enforce the principle of least privilege to reduce the risk of exploitation. 3) Implement strong authentication and session management controls to prevent unauthorized access to privileged accounts. 4) Conduct regular code reviews and input validation audits on custom configurations or plugins that interact with the Commands Connectors modules. 5) Monitor web application logs for unusual script injection attempts or anomalous behavior indicative of XSS exploitation. 6) Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts within the web interface. 7) Educate administrators about the risks of stored XSS and safe handling of configuration inputs. 8) Consider network segmentation to isolate monitoring infrastructure from less trusted network zones to limit exposure. 9) Prepare incident response plans that include detection and remediation steps for XSS attacks within monitoring tools.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Centreon
- Date Reserved
- 2025-07-31T18:25:10.514Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68ee81fc8fa40b621b08e8a3
Added to database: 10/14/2025, 5:01:48 PM
Last enriched: 10/22/2025, 1:13:20 AM
Last updated: 12/2/2025, 12:07:46 PM
Views: 36
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13090: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in listingthemes WP Directory Kit
MediumCVE-2025-13353: CWE-330 Use of Insufficiently Random Values in Cloudflare gokey
HighPersonal Information of 33.7 Million Stolen From Coupang
MediumCVE-2025-13873: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in ObjectPlanet Opinio
MediumCVE-2025-13872: CWE-918 Server-Side Request Forgery (SSRF) in ObjectPlanet Opinio
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.