A client-side path traversal vulnerability was discovered in the web management interface front-end due to missing validation of an input parameter. An authenticated user with limited privileges can craft a malicious URL which, if visited by an authenticated victim, leads to a Cross-Site Scripting (XSS) attack.
Advisories

No advisories yet.

Fixes

Solution

Upgrade to v25.2.0 or later.


Workaround

Use internal firewall features to limit access to the web management interface.

History

Wed, 08 Oct 2025 13:45:00 +0000

Type Values Removed Values Added
First Time appeared Nozominetworks
Nozominetworks cmc
Nozominetworks guardian
Vendors & Products Nozominetworks
Nozominetworks cmc
Nozominetworks guardian

Tue, 07 Oct 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 07 Oct 2025 12:45:00 +0000

Type Values Removed Values Added
Description A client-side path traversal vulnerability was discovered in the web management interface front-end due to missing validation of an input parameter. An authenticated user with limited privileges can craft a malicious URL which, if visited by an authenticated victim, leads to a Cross-Site Scripting (XSS) attack.
Title Client-side path traversal in Guardian/CMC before 25.2.0
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 7.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:H'}

cvssV4_0

{'score': 5.8, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:L/VI:H/VA:H/SC:L/SI:L/SA:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Nozomi

Published:

Updated: 2025-10-07T13:21:49.093Z

Reserved: 2025-04-16T09:04:05.707Z

Link: CVE-2025-3718

cve-icon Vulnrichment

Updated: 2025-10-07T13:20:27.476Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-10-07T13:15:33.640

Modified: 2025-10-08T19:38:32.610

Link: CVE-2025-3718

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-10-08T13:38:50Z