Metrics
Affected Vendors & Products
No advisories yet.
Solution
The following software releases have been updated to resolve this specific issue: Junos Space 24.1R4, and all subsequent releases.
Workaround
There are no known workarounds for this issue.
Link | Providers |
---|---|
https://supportportal.juniper.net/JSA103140 |
![]() ![]() |
Fri, 10 Oct 2025 11:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Juniper
Juniper junos Juniper junos Space |
|
Vendors & Products |
Juniper
Juniper junos Juniper junos Space |
Thu, 09 Oct 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 09 Oct 2025 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Juniper Networks Junos Space allows an attacker to inject script tags in the arbitrary device search field that, when visited by another user, enables the attacker to execute commands with the target's permissions, including an administrator.This issue affects all versions of Junos Space before 24.1R4. | |
Title | Junos Space: The arbitrary device search field is vulnerable to reflected cross-site script injection | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2025-10-09T19:48:22.089Z
Reserved: 2025-09-23T18:19:06.958Z
Link: CVE-2025-59987

Updated: 2025-10-09T18:49:16.436Z

Status : Received
Published: 2025-10-09T17:16:00.617
Modified: 2025-10-09T17:16:00.617
Link: CVE-2025-59987

No data.

Updated: 2025-10-10T11:17:51Z