No analysis available yet.
Vendor Solution
Update to the newest software version, at least version 3.0.0
Vendor Workaround
If you cannot immediately update to the recommended version, we recommend the following compensating measures: 1. Operate the MiR system in a segmented and secured network with strict firewall rules 2. Secure user accounts on the MiR system as recommended in the MiR Cybersecurity Guide.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-28827 | Stored cross-site scripting (XSS) in the web interface of MiR software versions prior to 3.0.0 on MiR Robots and MiR Fleet allows execution of arbitrary JavaScript code in a victim’s browser |
Wed, 05 Nov 2025 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 05 Nov 2025 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 21 Aug 2025 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mobile-industrial-robots
Mobile-industrial-robots mir100 Mobile-industrial-robots mir1000 Mobile-industrial-robots mir200 Mobile-industrial-robots mir250 Mobile-industrial-robots mir500 |
|
| Vendors & Products |
Mobile-industrial-robots
Mobile-industrial-robots mir100 Mobile-industrial-robots mir1000 Mobile-industrial-robots mir200 Mobile-industrial-robots mir250 Mobile-industrial-robots mir500 |
Wed, 20 Aug 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 20 Aug 2025 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Stored cross-site scripting (XSS) in the web interface of MiR software versions prior to 3.0.0 on MiR Robots and MiR Fleet allows execution of arbitrary JavaScript code in a victim’s browser | |
| Title | Cross-site scripting (XSS) in MiR robots and MiR fleet | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: TRO
Published:
Updated: 2025-11-05T12:07:24.766Z
Reserved: 2025-08-20T07:11:04.843Z
Link: CVE-2025-9225
Updated: 2025-08-20T17:21:36.303Z
Status : Awaiting Analysis
Published: 2025-08-20T08:15:50.097
Modified: 2025-11-05T13:15:35.177
Link: CVE-2025-9225
No data.
OpenCVE Enrichment
Updated: 2025-08-21T12:59:03Z
EUVD