Metrics
Affected Vendors & Products
No advisories yet.
Solution
Nagios addresses this vulnerability as "Fixed XSS vulnerability in Nagios Core ui by patching Core for XI systems with escape_string()."
Workaround
No workaround given by the vendor.
Tue, 04 Nov 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nagios
Nagios xi |
|
| Vendors & Products |
Nagios
Nagios xi |
Mon, 03 Nov 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Nagios XI versions prior to 5.8.7 using embedded Nagios Core are vulnerable to cross-site scripting (XSS) via the Core UI’s Views URL handling. Insufficient validation or escaping of user-supplied input may allow an attacker to inject and execute arbitrary script in the context of a victim's browser. | |
| Title | Nagios XI < 5.8.7 XSS in Core UI Views URL handling | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-11-03T21:56:10.803Z
Reserved: 2025-10-30T15:47:16.865Z
Link: CVE-2021-47698
No data.
Status : Awaiting Analysis
Published: 2025-11-03T22:15:53.100
Modified: 2025-11-04T15:41:31.450
Link: CVE-2021-47698
No data.
OpenCVE Enrichment
Updated: 2025-11-04T16:34:46Z