Home

Description

Advantech WISE-DeviceOn Server versions prior to 5.4 contain a stored cross-site scripting (XSS) vulnerability in the /rmm/v1/dog/{agentId} endpoint. When an authenticated user adds or edits Software Watchdog process rules for an agent, the monitored process name is stored in the settings array and later rendered in the Software Watchdog UI without proper HTML sanitation. An attacker can inject malicious script into the process name, which is then executed in the browser context of users who view or interact with the affected rules, potentially enabling session compromise and unauthorized actions as the victim.

PUBLISHED Reserved 2025-04-15 | Published 2025-12-05 | Updated 2025-12-05 | Assigner VulnCheck




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N

Problem types

CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')

Product status

Default status
unaffected

Any version before 5.4
affected

Credits

Alex Williams from Pellera Technologies finder

References

advcloudfiles.advantech.com/...RITY-ADVISORY----DeviceOn.pdf vendor-advisory patch

docs.deviceon.advantech.com/docs/resource/ product

www.vulncheck.com/...uthenticated-stored-xss-via-dog-agentid third-party-advisory

cve.org (CVE-2025-34264)

nvd.nist.gov (CVE-2025-34264)