Assets and Nodes stored XSS in admin panel (CVE-2025-40899)
CVE-2025-40899
A Stored Cross-Site Scripting vulnerability was discovered in the Assets and Nodes functionality due to improper validation of an input parameter. An authenticated user with custom fields privileges c...
Overview
A high-severity stored cross-site scripting (XSS) vulnerability, tracked as CVE-2025-40899, has been identified in the Assets and Nodes functionality of an application. The flaw allows an authenticated attacker to inject malicious scripts that execute automatically when viewed by other users, leading to session hijacking and unauthorized actions.
Vulnerability Details
The vulnerability stems from improper input validation in a parameter within the custom fields feature. An authenticated user with privileges to manage custom fields can create a field containing a malicious JavaScript payload. This payload is then stored by the application. When another user, such as an administrator, visits the Assets or Nodes pages where this tainted field is displayed, the script executes automatically within the victim’s browser session.
The attack requires low-privilege access (custom fields permissions) and user interaction (a victim viewing the page). Its network-based attack vector and low complexity contribute to its CVSS v3.1 base score of 8.9 (High).
Impact and Risks
Successful exploitation allows an attacker to perform actions within the application as the victim user. This can lead to:
- Modification or deletion of application data within the Assets and Nodes sections.
- Disruption of application availability for targeted users.
- Access to sensitive information visible in the victim’s session, which may be limited by the victim’s own permissions. While the EPSS score indicates a very low probability (0.0%) of widespread exploitation in the next 30 days, the potential impact of a compromised administrator account warrants prompt attention.
Remediation and Mitigation
The primary remediation is to apply the official patch or upgrade to a fixed version as soon as it is released by the vendor. System administrators should monitor the vendor’s security advisory for specific version information.
If an immediate patch is not available, consider these mitigation steps:
- Review and audit user accounts with “custom fields” privileges. Restrict this permission to only trusted, necessary users.
- Implement a Content Security Policy (CSP) to help mitigate the impact of potential XSS flaws.
- Encourage users to log out of administrative sessions when not actively using the application.
Security Insight
This vulnerability highlights the persistent risk of stored XSS in administrative interfaces, where a compromise can lead to significant lateral movement. It mirrors past incidents where seemingly low-impact entry points in custom configuration panels were leveraged for full account takeover, underscoring the need for rigorous input sanitization in all user-facing data fields, not just primary content areas. For more on how such vulnerabilities can lead to data exposure, see our breach reports.
Further Reading
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
Postiz is an AI social media scheduling tool. Prior to version 2.21.6, a file upload validation bypass allows any authenticated user to upload arbitrary HTML, SVG, or other executable file types to th...
A Cross-site Scripting (XSS) vulnerability was identified in the `from_dict` method of the `AppLollmsMessage` class in parisneo/lollms prior to version 2.2.0. The vulnerability arises from the lack of...
Stored XSS in log viewer in CoolerControl/coolercontrol-ui <4.0.0 allows unauthenticated attackers to take over the service via malicious JavaScript in poisoned log entries...
MyBB Downloads Plugin 2.0.3 contains a persistent cross-site scripting vulnerability that allows regular members to inject malicious scripts through the download title field. Attackers can submit a ne...