Cyber Posture

CVE-2025-27405

High

Published: 26 March 2025

Published
26 March 2025
Modified
01 August 2025
KEV Added
Patch
CVSS Score 7.6 CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H
EPSS Score 0.0032 55.1th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.

Security Summary

CVE-2025-27405 is a cross-site scripting (XSS) vulnerability (CWE-79) affecting Icinga Web 2, an open source monitoring web interface, framework, and command-line interface. Versions prior to 2.11.5 and 2.12.13 are vulnerable, enabling an attacker to craft a malicious URL that embeds arbitrary JavaScript into the Icinga Web interface when visited by a user. The vulnerability carries a CVSS v3.1 base score of 7.6 (AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H).

An attacker with high privileges (PR:H) can exploit this by crafting a URL that requires a user to visit it (UI:R), such as through social engineering like phishing or shared links. Once visited over the network (AV:N), the embedded JavaScript executes in the context of the victim's session, allowing the attacker to act on behalf of that user. This can lead to high confidentiality, integrity, and availability impacts (C:H/I:H/A:H) with elevated scope (S:C), potentially enabling unauthorized actions based on the victim's permissions.

The issue is resolved in Icinga Web 2 versions 2.11.5 and 2.12.3, as detailed in the project's release notes and security advisory (GHSA-3x37-fjc3-ch8w). As a workaround for version 2.12.2, administrators can enable a content security policy in the application settings. Security practitioners should prioritize patching affected installations and review access controls for privileged users.

Details

CWE(s)
CWE-79

Affected Products

icinga
icinga web 2
≤ 2.11.5 · 2.12.0 — 2.12.3

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
T1185 Browser Session Hijacking Collection
Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.
Why these techniques?

XSS vuln enables arbitrary JS injection/execution via malicious URL in web app (T1190), direct JS code execution (T1059.007), and acting on behalf of victim via session context (T1185).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References