CVE-2025-57543
Received Received - Intake
Stored XSS in NetBox 4.3.5 Comment Field Enables UI Redress

Publication date: 2026-03-16

Last updated on: 2026-03-20

Assigner: MITRE

Description
Cross Site scripting vulnerability (XSS) in NetBox 4.3.5 "comment" field on object forms. An attacker can inject arbitrary HTML, which will be rendered in the web UI when viewed by other users. This could potentially lead to user interface redress attacks or be escalated to XSS in certain contexts.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-16
Last Modified
2026-03-20
Generated
2026-05-07
AI Q&A
2026-03-16
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
netbox netbox 4.3.5
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a Cross Site Scripting (XSS) issue found in NetBox version 4.3.5, specifically in the "comment" field on object forms.

An attacker can inject arbitrary HTML code into this field, which will then be rendered in the web user interface when viewed by other users.

This can lead to user interface redress attacks or escalate to more harmful XSS attacks in certain contexts.


How can this vulnerability impact me? :

The impact of this vulnerability includes the possibility for attackers to execute malicious scripts in the context of other users viewing the injected content.

This can result in unauthorized actions performed on behalf of users, theft of sensitive information such as session tokens, or manipulation of the user interface to deceive users.

Such attacks can compromise the integrity and confidentiality of the affected system and its users.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves Cross Site Scripting (XSS) in the "comment" field on object forms in NetBox 4.3.5. Detection typically involves inspecting the web application inputs and outputs for injected HTML or script code.

To detect this vulnerability on your system, you can perform manual or automated testing by submitting HTML or JavaScript payloads in the "comment" fields of NetBox object forms and observing if the input is rendered without proper sanitization.

There are no specific commands provided in the available resources for detection.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps for this XSS vulnerability include avoiding the use of the vulnerable "comment" field for untrusted input and restricting access to the affected NetBox 4.3.5 instance to trusted users only.

Additionally, monitor for any updates or patches from the NetBox project that address this vulnerability and apply them as soon as they become available.

Implementing web application firewall (WAF) rules to detect and block suspicious input patterns may also help reduce risk.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart