CVE-2025-57543
Stored XSS in NetBox 4.3.5 Comment Field Enables UI Redress
Publication date: 2026-03-16
Last updated on: 2026-03-20
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| netbox | netbox | 4.3.5 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Cross Site Scripting (XSS) issue found in NetBox version 4.3.5, specifically in the "comment" field on object forms.
An attacker can inject arbitrary HTML code into this field, which will then be rendered in the web user interface when viewed by other users.
This can lead to user interface redress attacks or escalate to more harmful XSS attacks in certain contexts.
How can this vulnerability impact me? :
The impact of this vulnerability includes the possibility for attackers to execute malicious scripts in the context of other users viewing the injected content.
This can result in unauthorized actions performed on behalf of users, theft of sensitive information such as session tokens, or manipulation of the user interface to deceive users.
Such attacks can compromise the integrity and confidentiality of the affected system and its users.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability involves Cross Site Scripting (XSS) in the "comment" field on object forms in NetBox 4.3.5. Detection typically involves inspecting the web application inputs and outputs for injected HTML or script code.
To detect this vulnerability on your system, you can perform manual or automated testing by submitting HTML or JavaScript payloads in the "comment" fields of NetBox object forms and observing if the input is rendered without proper sanitization.
There are no specific commands provided in the available resources for detection.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps for this XSS vulnerability include avoiding the use of the vulnerable "comment" field for untrusted input and restricting access to the affected NetBox 4.3.5 instance to trusted users only.
Additionally, monitor for any updates or patches from the NetBox project that address this vulnerability and apply them as soon as they become available.
Implementing web application firewall (WAF) rules to detect and block suspicious input patterns may also help reduce risk.