This issue affects all versions of Junos Space before 24.1R4.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
The following software releases have been updated to resolve this specific issue: Junos Space 24.1R4, and all subsequent releases.
Workaround
To reduce the risk of exploitation of this issue, use access lists or firewall filters to limit access to the device's web management interface only from trusted hosts and administrators.
Link | Providers |
---|---|
https://supportportal.juniper.net/JSA103140 |
![]() ![]() |
Thu, 09 Oct 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 09 Oct 2025 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Juniper Networks Junos Space allows an attacker to store script tags directly in web pages that, when viewed by another user, enable the attacker to execute commands with the target's administrative permissions. This issue affects all versions of Junos Space before 24.1R4. | |
Title | Junos Space: Stored cross-site scripting vulnerability in web application | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2025-10-09T19:49:08.643Z
Reserved: 2025-09-23T18:19:06.956Z
Link: CVE-2025-59978

Updated: 2025-10-09T19:45:05.236Z

Status : Received
Published: 2025-10-09T17:15:59.250
Modified: 2025-10-09T17:15:59.250
Link: CVE-2025-59978

No data.

No data.