Cyber Posture

CVE-2025-27406

High

Published: 26 March 2025

Published
26 March 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.6 CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H
EPSS Score 0.0011 29.5th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse various implementations of JavaScript for execution.

Security Summary

CVE-2025-27406 is a cross-site scripting (XSS) vulnerability, associated with CWE-79 and CWE-918, affecting the Icinga Reporting module, a central component for reporting functionality in the Icinga Web 2 monitoring web frontend and framework. The flaw exists in versions 0.10.0 through 1.0.2, where attackers can create templates that embed arbitrary JavaScript code.

Exploitation requires network access, high privileges (PR:H), user interaction (UI:R), and high attack complexity (AC:H), as indicated by the CVSS v3.1 base score of 7.6 with changed scope (S:C) and high impacts on confidentiality, integrity, and availability. A high-privileged attacker can set up a malicious template; if a victim previews it, the embedded JavaScript executes in the user's context, allowing actions on the user's behalf. If a report using the template is printed to PDF, the JavaScript executes in the context of the headless browser, potentially enabling server-side request forgery or other actions.

The issue is fixed in Icinga Reporting version 1.0.3. As a workaround, administrators should review all templates and remove any suspicious settings. Additional details are available in the module's release notes at https://github.com/Icinga/icingaweb2-module-reporting/releases/tag/v1.0.3 and the security advisory at https://github.com/Icinga/icingaweb2-module-reporting/security/advisories/GHSA-7qvq-54vm-r7hx.

Details

CWE(s)
CWE-79CWE-918

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
Why these techniques?

XSS in web application allows arbitrary JavaScript execution in user/headless browser context (T1059.007) and facilitates exploitation of the public-facing web frontend (T1190), with potential SSRF.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v19.0

References