Metrics
Affected Vendors & Products
No advisories yet.
Solution
Upgrade to v25.2.0 or later.
Workaround
Use internal firewall features to limit access to the web management interface.
Link | Providers |
---|---|
https://security.nozominetworks.com/NN-2025:4-01 |
![]() ![]() |
Wed, 08 Oct 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Nozominetworks
Nozominetworks cmc Nozominetworks guardian |
|
Vendors & Products |
Nozominetworks
Nozominetworks cmc Nozominetworks guardian |
Tue, 07 Oct 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 07 Oct 2025 12:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A client-side path traversal vulnerability was discovered in the web management interface front-end due to missing validation of an input parameter. An authenticated user with limited privileges can craft a malicious URL which, if visited by an authenticated victim, leads to a Cross-Site Scripting (XSS) attack. | |
Title | Client-side path traversal in Guardian/CMC before 25.2.0 | |
Weaknesses | CWE-22 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Nozomi
Published:
Updated: 2025-10-07T13:21:49.093Z
Reserved: 2025-04-16T09:04:05.707Z
Link: CVE-2025-3718

Updated: 2025-10-07T13:20:27.476Z

Status : Awaiting Analysis
Published: 2025-10-07T13:15:33.640
Modified: 2025-10-08T19:38:32.610
Link: CVE-2025-3718

No data.

Updated: 2025-10-08T13:38:50Z