CVE-2025-11004
Awaiting Analysis Awaiting Analysis - Queue
Reflected XSS in Simplicity Device Manager APIs Risks System Security

Publication date: 2026-02-10

Last updated on: 2026-02-10

Assigner: Silicon Graphics (SGI)

Description
The Simplicity Device Manager Tool has a Reflected XSS (Cross-site-scripting) vulnerability in several API endpoints. The attacker needs to be on the same network to execute this attack.Β These APIs can affect confidentiality, integrity, and availability of the system that has Simplicity Device Manager tool running in the background.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-10
Last Modified
2026-02-10
Generated
2026-05-07
AI Q&A
2026-02-10
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
silabs simplicity_device_manager *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?

I don't know


How can this vulnerability impact me? :

This vulnerability can impact the confidentiality, integrity, and availability of the system running the Simplicity Device Manager Tool. Exploiting the reflected XSS could allow an attacker to execute malicious scripts in the context of the victim's browser, potentially leading to unauthorized access, data manipulation, or disruption of service.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


Can you explain this vulnerability to me?

The vulnerability is a Reflected Cross-site Scripting (XSS) issue found in several API endpoints of the Simplicity Device Manager Tool. An attacker who is on the same network as the affected system can exploit this vulnerability by injecting malicious scripts into the API responses, which are then reflected back to the user.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart