CVE-2025-8460: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Centreon Infra Monitoring
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Centreon Infra Monitoring (Notification rules, Open tickets module) allows Stored XSS by users with elevated privileges.This issue affects Infra Monitoring: from 24.10.0 before 24.10.5, from 24.04.0 before 24.04.5, from 23.10.0 before 23.10.4.
AI Analysis
Technical Summary
CVE-2025-8460 identifies a stored Cross-site Scripting (XSS) vulnerability classified under CWE-79 in Centreon Infra Monitoring, a widely used IT infrastructure monitoring solution. The vulnerability exists due to improper neutralization of user-supplied input during web page generation within the Notification rules and Open tickets modules. Specifically, users with elevated privileges can inject malicious JavaScript code that is stored persistently and executed in the browsers of other users who access the affected pages. This flaw affects multiple versions: 23.10.0 before 23.10.4, 24.04.0 before 24.04.5, and 24.10.0 before 24.10.5. The CVSS 3.1 base score is 6.8, reflecting a medium severity with the vector AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N, indicating network attack vector, low attack complexity, high privileges required, no user interaction, scope changed, high confidentiality impact, no integrity or availability impact. The vulnerability allows attackers to compromise confidentiality by stealing session tokens or executing unauthorized actions under the victim’s context. Although no known exploits are reported in the wild, the vulnerability poses a significant risk in environments where Centreon is deployed for critical monitoring. The issue underscores the importance of secure coding practices such as proper input validation and output encoding to prevent XSS. Centreon has released patches in versions 23.10.4, 24.04.5, and 24.10.5 to remediate this vulnerability.
Potential Impact
For European organizations, the impact of CVE-2025-8460 can be substantial, especially those relying on Centreon Infra Monitoring for managing critical IT infrastructure and services. Successful exploitation could lead to the theft of sensitive session cookies or authentication tokens, enabling attackers to impersonate privileged users and access confidential monitoring data or manipulate alerting mechanisms. This could result in unauthorized disclosure of sensitive operational information, undermining the integrity of incident response and potentially delaying detection of other attacks. While the vulnerability does not directly affect system availability or integrity, the confidentiality breach can facilitate further attacks or lateral movement within networks. Given the widespread adoption of Centreon in sectors such as finance, telecommunications, and government across Europe, the risk extends to critical national infrastructure and enterprise environments. The requirement for elevated privileges limits exploitation to insiders or compromised accounts, but the potential damage from such an attack remains significant.
Mitigation Recommendations
1. Immediate upgrade to the fixed versions: 23.10.4, 24.04.5, or 24.10.5 as applicable to the deployed version of Centreon Infra Monitoring. 2. Implement strict input validation and output encoding on all user-supplied data, especially in the Notification rules and Open tickets modules, to prevent injection of malicious scripts. 3. Enforce the principle of least privilege to limit the number of users with elevated access rights capable of exploiting this vulnerability. 4. Monitor logs and alerts for unusual activities related to web interface usage, particularly from privileged accounts. 5. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the web application context. 6. Conduct regular security assessments and penetration testing focused on web application vulnerabilities in Centreon deployments. 7. Educate administrators and users with elevated privileges about the risks of XSS and safe handling of input fields. 8. Consider network segmentation and multi-factor authentication to reduce the risk of privilege escalation and lateral movement.
Affected Countries
Germany, France, United Kingdom, Netherlands, Belgium, Italy, Spain, Sweden
CVE-2025-8460: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Centreon Infra Monitoring
Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Centreon Infra Monitoring (Notification rules, Open tickets module) allows Stored XSS by users with elevated privileges.This issue affects Infra Monitoring: from 24.10.0 before 24.10.5, from 24.04.0 before 24.04.5, from 23.10.0 before 23.10.4.
AI-Powered Analysis
Technical Analysis
CVE-2025-8460 identifies a stored Cross-site Scripting (XSS) vulnerability classified under CWE-79 in Centreon Infra Monitoring, a widely used IT infrastructure monitoring solution. The vulnerability exists due to improper neutralization of user-supplied input during web page generation within the Notification rules and Open tickets modules. Specifically, users with elevated privileges can inject malicious JavaScript code that is stored persistently and executed in the browsers of other users who access the affected pages. This flaw affects multiple versions: 23.10.0 before 23.10.4, 24.04.0 before 24.04.5, and 24.10.0 before 24.10.5. The CVSS 3.1 base score is 6.8, reflecting a medium severity with the vector AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N, indicating network attack vector, low attack complexity, high privileges required, no user interaction, scope changed, high confidentiality impact, no integrity or availability impact. The vulnerability allows attackers to compromise confidentiality by stealing session tokens or executing unauthorized actions under the victim’s context. Although no known exploits are reported in the wild, the vulnerability poses a significant risk in environments where Centreon is deployed for critical monitoring. The issue underscores the importance of secure coding practices such as proper input validation and output encoding to prevent XSS. Centreon has released patches in versions 23.10.4, 24.04.5, and 24.10.5 to remediate this vulnerability.
Potential Impact
For European organizations, the impact of CVE-2025-8460 can be substantial, especially those relying on Centreon Infra Monitoring for managing critical IT infrastructure and services. Successful exploitation could lead to the theft of sensitive session cookies or authentication tokens, enabling attackers to impersonate privileged users and access confidential monitoring data or manipulate alerting mechanisms. This could result in unauthorized disclosure of sensitive operational information, undermining the integrity of incident response and potentially delaying detection of other attacks. While the vulnerability does not directly affect system availability or integrity, the confidentiality breach can facilitate further attacks or lateral movement within networks. Given the widespread adoption of Centreon in sectors such as finance, telecommunications, and government across Europe, the risk extends to critical national infrastructure and enterprise environments. The requirement for elevated privileges limits exploitation to insiders or compromised accounts, but the potential damage from such an attack remains significant.
Mitigation Recommendations
1. Immediate upgrade to the fixed versions: 23.10.4, 24.04.5, or 24.10.5 as applicable to the deployed version of Centreon Infra Monitoring. 2. Implement strict input validation and output encoding on all user-supplied data, especially in the Notification rules and Open tickets modules, to prevent injection of malicious scripts. 3. Enforce the principle of least privilege to limit the number of users with elevated access rights capable of exploiting this vulnerability. 4. Monitor logs and alerts for unusual activities related to web interface usage, particularly from privileged accounts. 5. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the web application context. 6. Conduct regular security assessments and penetration testing focused on web application vulnerabilities in Centreon deployments. 7. Educate administrators and users with elevated privileges about the risks of XSS and safe handling of input fields. 8. Consider network segmentation and multi-factor authentication to reduce the risk of privilege escalation and lateral movement.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Centreon
- Date Reserved
- 2025-08-01T13:57:56.199Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 694926ef9679ab05af621758
Added to database: 12/22/2025, 11:09:35 AM
Last enriched: 12/22/2025, 11:21:05 AM
Last updated: 12/22/2025, 2:13:08 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14018: CWE-428 Unquoted Search Path or Element in NetBT Consulting Services Inc. e-Fatura
High22nd December – Threat Intelligence Report
MediumCVE-2025-54890: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Centreon Infra Monitoring
MediumCVE-2025-12514: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Centreon Infra Monitoring - Open-tickets
HighUkrainian Nefilim Ransomware Affiliate Pleads Guilty in US
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.