CVE-2025-34262
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-05

Last updated on: 2025-12-17

Assigner: VulnCheck

Description
Advantech WISE-DeviceOn Server versions prior to 5.4 contain a stored cross-site scripting (XSS) vulnerability in the /rmm/v1/devices/name/{agent_id} endpoint. When an authenticated user renames a device, the new_name value is stored and later rendered in device listings or detail views without proper HTML sanitation. An attacker can inject malicious script into the device name, which is then executed in the browser context of users who view or interact with the affected device, potentially enabling session compromise and unauthorized actions as the victim.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-05
Last Modified
2025-12-17
Generated
2026-05-07
AI Q&A
2025-12-05
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
advantech wise-deviceon_server to 5.4 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a stored cross-site scripting (XSS) issue in Advantech WISE-DeviceOn Server versions prior to 5.4. It occurs in the /rmm/v1/devices/name/{agent_id} endpoint where an authenticated user can rename a device. The new device name is stored and later displayed without proper HTML sanitation, allowing an attacker to inject malicious scripts. These scripts execute in the browsers of users who view or interact with the affected device, potentially leading to session compromise and unauthorized actions.


How can this vulnerability impact me? :

The vulnerability can lead to session compromise and unauthorized actions by attackers. If a malicious script is injected into a device name, it can execute in the browser of users who view the device, potentially allowing attackers to hijack user sessions or perform actions on behalf of the victim without their consent.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking if device names in the Advantech WISE-DeviceOn Server (versions prior to 5.4) contain suspicious or malicious script tags, especially in the /rmm/v1/devices/name/{agent_id} endpoint. Since it requires authenticated access to rename devices, you can audit device names for injected scripts. Commands to detect this might include querying the device names via API calls or database queries and searching for HTML or JavaScript code patterns. For example, using curl to fetch device names and grep to find script tags: curl -s -H "Authorization: Bearer <token>" https://<deviceon-server>/rmm/v1/devices/name/<agent_id> | grep -i '<script>' or querying the database for device names containing suspicious characters. However, no specific commands are provided in the resources. [1]


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to update Advantech WISE-DeviceOn Server to version 5.4 or later, where this stored XSS vulnerability has been fixed by properly sanitizing the new_name input. Additionally, restrict device renaming privileges to trusted users only and monitor device names for suspicious content. Applying proper input validation and output encoding on the server side is essential, but the primary recommendation is to upgrade to the fixed version. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart