Metrics
Affected Vendors & Products
No advisories yet.
Solution
Nagios addresses this vulnerability as "Fixed stored XSS security issue with command names having no encoding in the apply config error text."
Workaround
No workaround given by the vendor.
Fri, 31 Oct 2025 14:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Fri, 31 Oct 2025 10:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Nagios Nagios xi | |
| Vendors & Products | Nagios Nagios xi | 
Thu, 30 Oct 2025 22:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | Nagios XI versions prior to 5.8.9 are vulnerable to cross-site scripting (XSS) via the Apply Configuration error text. Insufficient validation or escaping of user-supplied input may allow an attacker to inject and execute arbitrary script in the context of a victim's browser. | |
| Title | Nagios XI < 5.8.9 Stored XSS via Command Names in Apply Config Error Text | |
| Weaknesses | CWE-79 | |
| References |  | |
| Metrics | cvssV4_0 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-10-31T13:55:41.690Z
Reserved: 2025-10-30T16:21:07.643Z
Link: CVE-2022-50587
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-10-31T13:52:58.521Z
 NVD
                        NVD
                    Status : Received
Published: 2025-10-30T22:15:42.207
Modified: 2025-10-30T22:15:42.207
Link: CVE-2022-50587
 Redhat
                        Redhat
                    No data.
 OpenCVE Enrichment
                        OpenCVE Enrichment
                    Updated: 2025-10-31T10:13:00Z