No analysis available yet.
Vendor Solution
Upgrade to v25.2.0 or later.
Vendor Workaround
Use internal firewall features to limit access to the web management interface.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://security.nozominetworks.com/NN-2025:4-01 |
|
Thu, 09 Oct 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:nozominetworks:cmc:*:*:*:*:*:*:*:* cpe:2.3:a:nozominetworks:guardian:*:*:*:*:*:*:*:* |
Wed, 08 Oct 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nozominetworks
Nozominetworks cmc Nozominetworks guardian |
|
| Vendors & Products |
Nozominetworks
Nozominetworks cmc Nozominetworks guardian |
Tue, 07 Oct 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 07 Oct 2025 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A client-side path traversal vulnerability was discovered in the web management interface front-end due to missing validation of an input parameter. An authenticated user with limited privileges can craft a malicious URL which, if visited by an authenticated victim, leads to a Cross-Site Scripting (XSS) attack. | |
| Title | Client-side path traversal in Guardian/CMC before 25.2.0 | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Nozomi
Published:
Updated: 2025-10-07T13:21:49.093Z
Reserved: 2025-04-16T09:04:05.707Z
Link: CVE-2025-3718
Updated: 2025-10-07T13:20:27.476Z
Status : Analyzed
Published: 2025-10-07T13:15:33.640
Modified: 2026-04-29T01:00:01.613
Link: CVE-2025-3718
No data.
OpenCVE Enrichment
Updated: 2025-10-08T13:38:50Z