Nagios Log Server versions prior to 2024R1 contain a stored cross-site scripting (XSS) vulnerability where an attacker-supplied username containing JavaScript is stored and later rendered without proper encoding/escaping in admin or user-facing pages. When an authenticated victim loads the affected page, the browser executes the injected script in the victim's context.
                
            Metrics
Affected Vendors & Products
Advisories
    No advisories yet.
Fixes
    Solution
Nagios addresses this vulnerability as "A stored XSS vulnerability was discovered via the username in Nagios Log Server" and "Fixed an XSS vulnerability when creating a new user."
Workaround
No workaround given by the vendor.
References
        History
                    Thu, 30 Oct 2025 21:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | Nagios Log Server versions prior to 2024R1 contain a stored cross-site scripting (XSS) vulnerability where an attacker-supplied username containing JavaScript is stored and later rendered without proper encoding/escaping in admin or user-facing pages. When an authenticated victim loads the affected page, the browser executes the injected script in the victim's context. | |
| Title | Nagios Log Server < 2024R1 Stored XSS via Username | |
| Weaknesses | CWE-79 | |
| References |  | |
| Metrics | cvssV4_0 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-10-30T21:26:13.848Z
Reserved: 2025-10-20T19:35:53.946Z
Link: CVE-2024-58272
 Vulnrichment
                        Vulnrichment
                    No data.
 NVD
                        NVD
                    Status : Received
Published: 2025-10-30T22:15:46.597
Modified: 2025-10-30T22:15:46.597
Link: CVE-2024-58272
 Redhat
                        Redhat
                    No data.
 OpenCVE Enrichment
                        OpenCVE Enrichment
                    No data.