Home

Description

A Stored Cross-Site Scripting vulnerability was discovered in the Dashboards functionality due to improper validation of an input parameter. An authenticated low-privilege user can craft a malicious dashboard containing a JavaScript payload and share it with victim users, or a victim can be socially engineered to import a malicious dashboard template. When the victim views or imports the dashboard, the XSS executes in their browser context, allowing the attacker to perform unauthorized actions as the victim, such as modify application data, disrupt application availability, and access limited sensitive information.

PUBLISHED Reserved 2025-04-16 | Published 2025-11-25 | Updated 2025-11-26 | Assigner Nozomi




MEDIUM: 5.8CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:L/VI:H/VA:H/SC:L/SI:L/SA:L

HIGH: 7.9CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:H

Problem types

CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')

Product status

Default status
unaffected

Any version before 25.4.0
affected

Default status
unaffected

Any version before 25.4.0
affected

Credits

This issue was found by Humza Ahmad of ENCS during a VAPT testing session commissioned by one of our customers. finder

References

security.nozominetworks.com/NN-2025:11-01

cve.org (CVE-2025-40890)

nvd.nist.gov (CVE-2025-40890)

Download JSON