Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25200: CWE-434 Unrestricted Upload of File with Dangerous Type in Samsung Electronics MagicINFO 9 Server

0
Critical
VulnerabilityCVE-2026-25200cvecve-2026-25200cwe-434
Published: Mon Feb 02 2026 (02/02/2026, 04:49:13 UTC)
Source: CVE Database V5
Vendor/Project: Samsung Electronics
Product: MagicINFO 9 Server

Description

A vulnerability in MagicInfo9 Server allows authorized users to upload HTML files without authentication, leading to Stored XSS, which can result in account takeover This issue affects MagicINFO 9 Server: less than 21.1090.1.

AI-Powered Analysis

AILast updated: 02/02/2026, 05:12:39 UTC

Technical Analysis

CVE-2026-25200 is a critical security vulnerability identified in Samsung Electronics MagicINFO 9 Server, specifically affecting versions earlier than 21.1090.1. The vulnerability is classified under CWE-434, which involves the unrestricted upload of files with dangerous types. In this case, the MagicINFO 9 Server improperly allows authorized users to upload HTML files without sufficient validation or authentication controls. This leads to a stored cross-site scripting (XSS) vulnerability, where malicious HTML or JavaScript code can be embedded and persistently stored on the server. When other users or administrators access the affected content, the malicious script executes in their browsers, potentially allowing attackers to hijack user sessions, steal credentials, or perform actions on behalf of legitimate users. The vulnerability does not require prior authentication or user interaction, increasing its exploitability. The CVSS v3.1 base score of 9.8 reflects the high impact on confidentiality, integrity, and availability, combined with the ease of exploitation over the network. Although no public exploits have been reported yet, the nature of the vulnerability and the critical score suggest that attackers could weaponize it rapidly. MagicINFO 9 Server is widely used for digital signage and content management in enterprise environments, making this vulnerability particularly concerning for organizations relying on Samsung's platform for operational communications and customer engagement. The lack of available patches at the time of disclosure necessitates immediate attention to mitigate risk.

Potential Impact

The impact of CVE-2026-25200 on European organizations can be significant, especially for those using Samsung MagicINFO 9 Server for digital signage and content management. Exploitation can lead to full account takeover, allowing attackers to manipulate displayed content, steal sensitive credentials, or pivot within the network. This compromises confidentiality by exposing user data and credentials, integrity by altering displayed or stored content, and availability if attackers disrupt signage services. Given the critical CVSS score and the absence of authentication requirements for exploitation, attackers can easily target vulnerable servers remotely. This could result in reputational damage, operational disruption, and potential regulatory non-compliance under GDPR if personal data is compromised. Industries such as retail, transportation, healthcare, and public sector entities that use MagicINFO for customer-facing displays or internal communications are particularly at risk. The persistent nature of stored XSS also increases the risk of widespread impact across multiple users and systems connected to the server.

Mitigation Recommendations

1. Immediate application of official patches or updates from Samsung once released is paramount to remediate the vulnerability. 2. Until patches are available, restrict access to MagicINFO 9 Server interfaces to trusted networks and users only, employing network segmentation and firewall rules. 3. Implement strict file upload validation controls to block HTML and other executable file types from being uploaded, including MIME type verification and content inspection. 4. Employ web application firewalls (WAFs) with rules designed to detect and block XSS payloads and suspicious file uploads. 5. Monitor server logs and user activities for unusual upload patterns or access anomalies that could indicate exploitation attempts. 6. Conduct regular security assessments and penetration testing focused on file upload functionalities. 7. Educate administrators and users about the risks of stored XSS and the importance of cautious handling of uploaded content. 8. Consider deploying Content Security Policy (CSP) headers to limit the impact of potential XSS attacks by restricting script execution contexts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
samsung.tv_appliance
Date Reserved
2026-01-30T06:07:11.090Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69802ecbac06320222b56536

Added to database: 2/2/2026, 4:57:47 AM

Last enriched: 2/2/2026, 5:12:39 AM

Last updated: 2/7/2026, 6:55:11 AM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats