Metrics
Affected Vendors & Products
No advisories yet.
Solution
Upgrade to v25.5.0 or later.
Workaround
Use internal firewall features to limit access to the web management interface.
| Link | Providers |
|---|---|
| https://security.nozominetworks.com/NN-2025:13-01 |
|
Thu, 18 Dec 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 18 Dec 2025 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A Stored Cross-Site Scripting vulnerability was discovered in the Reports functionality due to improper validation of an input parameter. An authenticated user with report privileges can define a malicious report containing a JavaScript payload, or a victim can be socially engineered to import a malicious report template. When the victim views or imports the report, the XSS executes in their browser context, allowing the attacker to perform unauthorized actions as the victim, such as modify application data, disrupt application availability, and access limited sensitive information. | |
| Title | Stored Cross-Site Scripting (XSS) in Reports in Guardian/CMC before 25.5.0 | |
| First Time appeared |
Nozomi Networks
Nozomi Networks cmc Nozomi Networks guardian |
|
| Weaknesses | CWE-79 | |
| CPEs | cpe:2.3:a:nozomi_networks:cmc:*:*:*:*:*:*:*:* cpe:2.3:a:nozomi_networks:guardian:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Nozomi Networks
Nozomi Networks cmc Nozomi Networks guardian |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Nozomi
Published:
Updated: 2025-12-18T14:30:50.600Z
Reserved: 2025-04-16T09:04:25.007Z
Link: CVE-2025-40892
Updated: 2025-12-18T14:30:45.112Z
Status : Awaiting Analysis
Published: 2025-12-18T14:15:59.457
Modified: 2025-12-18T15:07:18.427
Link: CVE-2025-40892
No data.
OpenCVE Enrichment
No data.